top of page

BLOG
Explore the latest trends, innovations, and strategies in cybersecurity and digital resilience.


2 min read
Obscure Technologies Becomes Tenable Distributor Across Africa
Obscure Technologies has partnered with Tenable, a global leader in cyber exposure and cyber risk management as a distributor across Africa

2 min read
Obscure Technologies Partners with Cyber Security Unicorn Pentera to Deliver Advanced Security Validation
Obscure Technologies , a leading cyber security specialist , has announced its partnership with Pentera , the global leader in automated...

3 min read
Obscure Technologies Creating New Roles to Support Growth Under New Leadership
Growth is the hallmark of a thriving business, but sustainable expansion requires clear strategic goals, innovative solutions, and the...


4 min read
Netskope Expands NewEdge Security Private Cloud Across Africa
Netskope, a global leader in security service edge (SSE) and zero trust solutions, has announced the latest expansion of its Netskope...

3 min read
Obscure Technologies, Splunk jointly using power of data to reduce carbon footprint in manufacturing
Our partnership with Splunk represents a powerful step forward for South African manufacturers.

3 min read
Obscure Technologies Named Tenable Distributor in 26 African Countries
Obscure Technologies , a leading cyber security specialist , has been appointed as the official distributor for Tenable in Africa , the...

4 min read
eBook: Kubernetes Management for Dummies – A Must-Read for Technology Leaders
In today’s fast-evolving technological landscape, Kubernetes has become more than just a tool for container orchestration.

3 min read
The Just In Podcast: Obscure Technologies Launches Channel for South Africa’s Cyber Security Professionals
Staying ahead in the fast-evolving world of cyber security just got easier for South African professionals, thanks to Obscure...


3 min read
eBook: How to get your cloud migration strategy right
In today’s fast-paced digital world, cloud migration is no longer just an IT initiative—it’s a critical business strategy. With...

3 min read
The Power of Gytpol Validator: Closing the Endpoint Security Gap
Endpoints are among the most vulnerable parts of any IT environment, and traditional security tools often overlook misconfigurations

3 min read
eBook: Okta – Your Guide to Getting Started with Zero Trust Cyber Security
In today’s world of sophisticated cyber threats, Zero Trust Security is emerging as the gold standard for protecting businesses and...
bottom of page