Latest showcases

More showcases...
Liberty cyberattack underscores high threat level for SA businesses
Liberty cyberattack underscores high threat level for SA businesses

With breaking news of major South African insurer Liberty Holdings falling victim to a cyberattack, local companies have to heed the warning and pay more attention to their internal systems and processes...

By Colin Thornton 4 Jul 2018

Mobile crypto mining malware is a growing smartphone threat
Mobile crypto mining malware is a growing smartphone threat

According to a report by Kaspersky, the number of internet users affected by cryptocurrency mining software has jumped by a considerable margin this year, when compared to last...

By Andy Walker 29 Jun 2018

Youth might be at risk online with too much data sharing
Youth might be at risk online with too much data sharing

As Youth Month draws to a close, I am concerned about data and the security issues that pertain to it. Where do millennials stand in this era of unlimited data and heightened vulnerability?

By Manie van Schalkwyk 27 Jun 2018

Harnessing blockchain technology to transform global cybersecurity
Harnessing blockchain technology to transform global cybersecurity

In a digitally driven world, cybersecurity has become a highly lucrative sphere of modern business. Today, experts around the world are clawing for a piece of the estimated $8.5bn cyberthreat intelligence industry pie...

By Colin Thornton 17 May 2018

Emilar Gandhi, public policy manager for the SADC region for Facebook | Photo: Jessica Tennant
Facebook Africa, Digify Africa launch online safety programme for SA youth

Facebook Africa and Digify Africa have partnered to launch an online safety programme called Ilizwe Lam, Xhosa for my world...

By Jessica Tennant 25 Apr 2018

The smart hotel of the future: How to leverage IoT to create the guest experience
The smart hotel of the future: How to leverage IoT to create the guest experience

Regardless of the size or type of property, every hotel operator that wants to remain competitive and relevant will have to embrace IoT devices and related wireless innovations over the next year to enable next-generation guest experiences...

By Pieter Engelbrecht 25 Apr 2018

This is how AI will change the way you drive
This is how AI will change the way you drive

While there have been some recent setbacks (and there will doubtless be more) it appears that, with the massive investments in R&D, driverless cars will one day become a reality...

By Sherry Zameer 18 Apr 2018

Three reasons BYOD dominates in tourism
Three reasons BYOD dominates in tourism

'Bring your own device' is frowned upon in many professional sectors, with legitimate fears around data security. Hospitality-based businesses, however, should not ignore the fact that their market is dedicated to a culture of BYOD...

By Wynand Smit 12 Apr 2018

Cybercrime is everywhere because businesses aren't educating
Cybercrime is everywhere because businesses aren't educating

Cybercrime has overtaken all other types of crime as humans have embraced digital technology without really understanding it...

By Simeon Tassev 11 Apr 2018

Don't spend another cent on cybersecurity until real risks have been assessed
Don't spend another cent on cybersecurity until real risks have been assessed

IT security has become a business necessity against the backdrop of proliferating threats from the web, malware and cyber extortion...

By Charl Ueckermann 6 Apr 2018

How to avoid falling prey to a Facebook/Cambridge Analytica-type scandal
How to avoid falling prey to a Facebook/Cambridge Analytica-type scandal

Following revelations that Cambridge Analytica exploited the personal data of millions of Facebook users, the social network is finding itself in a remarkably anti-social predicament...

By Ilse van den Berg 26 Mar 2018

A cybercriminal's tricks and trades to get into your phone
A cybercriminal's tricks and trades to get into your phone

While analysts figure out new methodologies for analysing malware and users begin to understand how all this works, cybercriminals are seeking new ways to hide in phones and compromise devices, says Carey van Vlaanderen, CEO of ESET Southern Africa...

By Carey van Vlaanderen 23 Mar 2018

2018 hospitality IoT trends: Creating a home away from home
2018 hospitality IoT trends: Creating a home away from home

There's a seismic shift happening in the hospitality industry, forcing businesses to take their wireless infrastructure beyond just offering free Wi-Fi, to enabling next-generation guest journeys. Here are the four most important IoT and wireless trends for the coming year...

By Pieter Engelbrecht 8 Feb 2018

Tips for C-level employees when managing IT security risks
Tips for C-level employees when managing IT security risks

Although most companies have invested in IT security solutions focussing on mitigating threats like viruses and malware, many fall short of addressing more sinister risks such as fraud, identity theft and espionage...

By Charl Ueckermann 2 Feb 2018

#BizTrends2018: Alternative payment methods gaining ground in corporate travel
#BizTrends2018: Alternative payment methods gaining ground in corporate travel

Sometimes necessity is the mother of invention, and sometimes invention is spurred by convenience. Business travellers increasingly use not one or two, but three or four different payment mechanisms throughout the duration of their trip...

By Pascalle Albrecht 25 Jan 2018

How to avoid disaster in the wake of Spectre and Meltdown
How to avoid disaster in the wake of Spectre and Meltdown

Earlier this month, while the majority of South African business owners were still enjoying their summer holiday, the global technology industry suffered a rather devastating blow...

By Colin Thornton 23 Jan 2018

#BizTrends2018: The developing cyberthreat landscape
#BizTrends2018: The developing cyberthreat landscape

2017 saw many organisations across the globe fall victim to some very serious cyberattacks. The reality is that the cybercriminal industry is growing - leaving many wondering when, and if, their business will be 'next on the list' and what the consequences will be...

By Riaan Badenhorst 15 Jan 2018

#BizTrends2018: Business intelligence trends to watch in 2018
#BizTrends2018: Business intelligence trends to watch in 2018

The move towards digital has become a prominent feature on the corporate agenda. And while it will assist in ensuring future competitiveness, it will not be achieved overnight...

By Yolanda Smit 11 Jan 2018

#BizTrends2018: Gearing up for a world of connected things
#BizTrends2018: Gearing up for a world of connected things

Deon Liebenberg, head of IoT at Vodacom, gives his insights on what will happen on the IoT landscape in 2018 and beyond...

By Deon Liebenberg 11 Jan 2018

Telltale indications that your WordPress site been hacked
Telltale indications that your WordPress site been hacked

Hacking has become a growing concern for website owners all over the world. Every year, thousands of WordPress websites are either compromised or hacked...

By Charles Mburugu 2 Jan 2018

57 million riders, drivers affected by Uber breach
57 million riders, drivers affected by Uber breach

Global transportation technology company Uber Technologies has admitted it suffered a breach that saw hackers stealing the personal information of approximately 57 million customers and drivers...

By Simon Campbell-Young 13 Dec 2017

By Arthur Buliva (Own work) , via Wikimedia Commons
Speakers announced for Africa Tech Summit Kigali 2018

The first 25 speakers from leading tech companies across Africa have been announced for the upcoming Africa Tech Summit Kigali...

By Tom Jackson 27 Nov 2017

Image source:
Securing the enterprise network with artificial intelligence

Artificial intelligence (AI) often throws up visions of a futuristic Earth, where self-aware robots are programmed to be ethical in their behaviour and protect human lives at all costs...

By Pieter Engelbrecht 21 Nov 2017

Safeguarding your customers against the threat of identity theft
Safeguarding your customers against the threat of identity theft

A recent data breach exposed the personal information of 30-million South Africans, including emails, ID numbers, addresses and contact numbers, and, in some cases, even passwords...

By Wynand Smit 17 Nov 2017

Colin Thornton
Deep packet sniffing, penetration testing and vulnerabilities: A guide to modern IT security

Yes, I know what you're thinking...this sounds like some kind of twisted geek version of Fifty Shades of Grey. And while I hope our message can instil the same kind of reader and media frenzy as that soft porn novel and film, it is admittedly a far more sombre (and arguably far more important) topic for discussion: IT security and mobility...

By Colin Thornton 16 Nov 2017

NEC/XON Summit 2017: Making Africa smarter and safer
NEC/XON Summit 2017: Making Africa smarter and safer

The NEC/XON ICT Summit 2017 kicked off on Monday, 6 November 2017. Keynote speakers included the likes of Carel Coetzee, CEO of XON and Hironobu Kurosaki, president and CEO of NEC Europe...

By Ilse van den Berg 7 Nov 2017

Database of 30 million+ South Africans leaked online, property group is culprit
Database of 30 million+ South Africans leaked online, property group is culprit

NEWSWATCH: After a database of more than 30 million South Africans had been leaked online, including estimated incomes‚ addresses, and cellphone numbers, one of the country's top real estate companies has admitted to being the unwitting source...

By Ilse van den Berg 19 Oct 2017

Photo by Hannah Wei on Unsplash
Serious Wi-Fi flaw found in WPA2 protocol

NEWSWATCH: A new cybersecurity attack, known as a ‘Krack' attack (key reinstallation attack) has revealed a flaw in Wi-Fi's WPA2's cryptographic protocols... (video)

By Ilse van den Berg 18 Oct 2017

Digital trust: the currency of the future
Digital trust: the currency of the future

Digital trust, in a nutshell, is about the ability to protect the digital data shared across a vast digital ecosystem. And it may just become the currency of the future...

By Paul Williams 21 Jul 2017

The six worst ransomware
The six worst ransomware

It's hard to keep track of the cybercriminal world as it seems these dark web creatures are constantly trying to outwit, outlast, and outplay each other with their destructive viruses...

By Colin Thornton 20 Jul 2017

Next >