AI, NFTs and the Modern Contract – Who Holds Responsibility?
As far back as 2018, Harvard Business Review raised the question: how is artificial intelligence (AI) changing contracts? Five years may not fit the...
DNSSense: “Cybersecurity leaders must focus on DNS security”
The absence of cybersecurity measures is hindering the digital vertical growth of the South African economy. A recent report revealed that nearly 90% of...
Payment fraud: Steps to take if your business gets scammed
Payment fraud is a nightmare scenario for any business. Irrespective of size, companies face substantial financial and reputational harm resulting from fraudulent activity. Depending...
Digital Transformation’s growing attack surface
Traditional business models need to be reimagined as digital transformation continues to enable businesses to innovate and find new ways to not only leverage...
Why the office of the future will demand stronger security measures
In today's age of innovation, enterprises are understandably concerned with how new technologies will impact the way jobs are performed in the next few...
What to Know Before Giving Into Ransom Demands
Despite small and medium enterprises (SMEs) becoming increasingly popular targets for cybercriminals, many remain completely unprotected in this regard. As a result, when faced...
Advanced Electronic Signatures – A Technology whose time has come
Part 2 - In my previous article on the subject (available here), I dealt with the arguments against using Advanced Electronic Signatures (Aes), and the...
Advanced Electronic Signatures – A Technology whose time has come
Since its inclusion in the Electronic Communications and Transactions Act (ECT Act), some 16 years ago, the Advanced Electronic Signature has been treated a...
Security breach puts Liberty at risk
While established insurance firm Liberty continues to throw everything it has at an investigation into the recent major data breach, the incident is a...
Top 5 tips for Preventing Invoice Fraud
Invoice fraud is becoming more common in South Africa, perhaps in response to worsening economic conditions. Detecting and successfully prosecuting this type of crime...
Email governance and compliance simplified with MailTrack
In the past, lawyers concerned with retaining the privacy and confidentiality of client information restricted the use of email for conducting business. It is...