Mining: Stepping carefully into 4IR

4IR is creating a need for regulation on issues such as unemployment, intellectual property , data privacy and security, and liability for defects and loss of control. Is your firm ready?

The legalities of the digital signature

To ensure better security, particularly with regards to highly sensitive or complex records and contracts, digital signatures are more efficient and reliable.

Can we clean up crime, corruption in public sector?

Technology could completely change the way people are able to track and record what is happening on the ground, whether it be a local security company, a police task force or emergency response team.

Data security sits at the heart of democracy

Military risks immediately spring to mind: a recent report found that even the Pentagon’s latest advanced military systems are vulnerable and can be “easily hacked”. By Thomas Mangwiro: public sector security specialist at Mimecast The consequences...

Dawn raids by regulators at your business?

The risk is very real, writes Elisha Bhugwandeen, professional support lawyer in Webber Wentzel’s competition team In a climate of increased competition law enforcement, having the right tools at your disposal is imperative. The South African Competition Commission...

Neural biometrics the next generation of security

With security as the watchword at every turn and in practically every transaction in modern-day life, the unsettling reality remains that fraud, identity theft, and cybercrime are rapidly on the increase globally. In South Africa, the SA Fraud Prevention Services...

How can I be compliant at a reasonable cost?

While the cost of compliance has escalated due to the ever-changing regulatory landscape, which can often mean a ripple effect of change across the business, there are solutions that enable organisations to reduce these costs. Taking a closer look at what these costs...

The gap between the law and how to apply it

Emerging forces in the environment pose a variety of challenges for today’s legal professionals. Attorneys and corporate counsel are expected to keep abreast of increased regulatory complexity in local and global jurisdictions, while clients are facing cost challenges...

People power needed to win the online security war

It’s estimated that two-thirds of people online – more than 2-billion individuals – have had their personal information stolen or compromised, and a business falls victim to a ransomware attack every 40 seconds. The threats are changing constantly, and there’s an...

Liberty data breach: setting a precedent for GDPR? 

Over the Youth Day weekend, Liberty informed its customers, and later everyone else, that it had been the subject of a successful security intrusion. In a media statement, it claimed that an email repository had been compromised, and that an as yet undisclosed number...

Cyber threats real for industrial automation systems

The ability to connect Information Technology (IT) systems with Operational Technology (OT) systems, such as Supervisory Control and Data Acquisition (SCADA) systems and Programmable Logic Controllers (PLCs), gives businesses access to information for a comprehensive...

Share This