Author:Dawood, Zubeida C; Mkuzangwe, Nenekazi NPDate:Mar 2022There is a growth of cyber-attacks in South Africa. Seeing that there are over 38 million Internet users in South Africa, this is no surprise. The South African government has published the National Cybersecurity Policy Framework (NCPF) and ...Read more
Author:Mwim, EN; Mtsweni, Jabu S; Chimbo, BDate:Mar 2023Human related vulnerability challenges continue to increase as organisations intensify their use of interconnected technologies for operations particularly due to the emergence of COVID-19 pandemic. Notwithstanding the challenge of a human ...Read more
Author:Mutemwa, Muyowa; Mtsweni, Jabu SDate:Mar 2022A Cybersecurity Operation Centre (SOC) is a centralized hub within an organisation that houses people, processes, and technologies aimed at continuous monitoring of the organization’s assets in order to prevent, detect, analyse, and respond ...Read more
Author:Veerasamy, NamoshaDate:Mar 2022A Cybersecurity Operation Centre (SOC) is a centralized hub within an organisation that houses people, processes, and technologies aimed at continuous monitoring of the organization’s assets in order to prevent, detect, analyse, and respond ...Read more
Author:Mwim, EM; Mtsweni, Jabu S; Chimbo, BDate:Jul 2023The healthcare sector has become a high target of cyber threats due to the nature of the industry and the potential of personal and confidential information. Human related factors have proven to be the major contributor to the challenges ...Read more
Author:Phahlamohlaka, Letlibe J; Théron, J; Aschmann, MJDate:2022Cybersecurity has evolved over the years, and today cyberattacks instigated by cyber-criminals, nation states, or insider threat actors are part of regular headline news. In South Africa and around the world, the number of cyberattacks or ...Read more
Author:Badenhorst, Danielle PDate:06 Sep 2023Reliance on digital technologies for innovation management is unavoidable in current contexts. While digital processes and business models have been prioritised as key factors to drive innovation and value creation within firms, cybersecurity ...Read more
Author:Cebekhulu, Eric; Onumanyi, Adeiza J; Isaac, Sherrin JDate:Feb 2022The use of machine learning (ML) algorithms for power demand and supply prediction is becoming increasingly popular in smart grid systems. Due to the fact that there exist many simple ML algorithms/models in the literature, the question arises ...Read more
Author:Mwim, EM; Mtsweni, Jabu S; Mwim, OSDate:Aug 2022The evolution in digital technologies and the Internet, in particular, has had a profound effect on the way healthcare institutions operate, assist patients, and manage personal healthcare data. In the same vein, various healthcare systems, ...Read more
Author:Mthethwa, Sthembile NDate:Aug 2023The tremendous growth of the Internet of Things (IoT) connected devices calls for a way for manufacturers to standardise the newly created devices for security purposes. As these devices are getting smaller and smaller so does the computational ...Read more
Author:Mwim, EN; Mtsweni, Jabu SDate:Jul 2022There is a need to shift from a purely technological approach in addressing cybersecurity threats to a more human inclusive method. As a result, cybersecurity culture is gaining momentum in research as an approach in addressing cybersecurity ...Read more