by Carole Eilertsen | May 12, 2024 | Digital Identity In South Africa, IT Security
According to Gartner, organisations should entrench identity management as part of their cybersecurity foundation. Specifically, security teams can work with identity and access management (IAM) practitioners to invest in IAM programs and create an identity fabric for...
by Carole Eilertsen | Nov 13, 2023 | IT Security
October is Cybersecurity Awareness Month, let’s take a moment this month to ask you: how comprehensive is your platform providers’ security? How do you evaluate them? When considering a platform or software service provider, two security issues should always be...
by Steven Bailey | May 17, 2023 | Blog
Vehicle Dealers Are Now Accountable Institutions. How Can They Adapt? Vehicle Dealers Are Now Accountable Institutions. How Can They Adapt? Vehicle Dealers Are Now Accountable Institutions. How Can They Adapt? Late last year, South Africa changed the Financial...
by admin | Jul 30, 2022 | Blog
Are you overengineering your processes to placate personal data? POPIA is good, but a lack of understanding of POPIA often results in overengineering data processes which in turn is bad for business. The difference of POPIA based on circumstances Let’s compare two...
by admin | Jun 28, 2022 | Blog
Contactable expands its Contactless Biometric Capture Technologies for Digital Onboarding Contactable will add T5-AirSnap Face technology from which is a fully contactless biometric capture technology powered by AI and deep learning for face biometric capture allowing...