Latest showcases

More showcases...
#GartnerSYM: The next phase of digital transformation
#GartnerSYM: The next phase of digital transformation

Digital business transformation is upon us. Enterprises, small and large, have recognised the power of tech to transform their ability to deliver value. But where do we go from here?

By Evan-Lee Courie 17 Sep 2018

Human error: the main cause of data breaches
Human error: the main cause of data breaches

With news headlines regularly announcing a new data breach, one wonders whether hackers are becoming more skilled or...

By Drew van Vuuren 4 Sep 2018

IoT in your home: what are the risks?
IoT in your home: what are the risks?

Smart homes are getting even smarter, with IoT devices rapidly coming to market to make homes more efficient and daily life more convenient, but...

By Doros Hadjizenonos 3 Sep 2018

Rethinking your business network
Rethinking your business network

Most companies today are on a digital transformation journey...

By Riaan Graham 28 Aug 2018

Why your future digital ID should harness blockchain technology
Why your future digital ID should harness blockchain technology

In the aftermath of the far-reaching Facebook-Cambridge Analytica data scandal and other, large-scale data leaks, it is undoubtedly time to adopt a more proactive approach...

By Colin Thornton 23 Aug 2018

SA needs to prioritise STEM education
SA needs to prioritise STEM education

South Africa already faces well-known challenges in its education system, felt nowhere more strongly than in the areas of science, technology, engineering and mathematics...

By Rob Lith 22 Aug 2018

Source: Jakub Jirsak ©
What's holding SA back from the public cloud?

The 2018 Right Scale State of the Cloud report indicates 81% of enterprises have a multi-cloud strategy and predicts 66% of cloud users intend on growing their cloud spend by 20%. But, what about the local market?

By Johan Scheepers 6 Aug 2018

How to protect your online privacy like you would your own home
How to protect your online privacy like you would your own home

Over the past few months, a spate of high-profile security breaches and scandals (most notably Facebook-Cambridge Analytica) have made the average person far more aware of how their data is used online...

By Alison Treadaway 24 Jul 2018

Liberty cyberattack underscores high threat level for SA businesses
Liberty cyberattack underscores high threat level for SA businesses

With breaking news of major South African insurer Liberty Holdings falling victim to a cyberattack, local companies have to heed the warning and pay more attention to their internal systems and processes...

By Colin Thornton 4 Jul 2018

Mobile crypto mining malware is a growing smartphone threat
Mobile crypto mining malware is a growing smartphone threat

According to a report by Kaspersky, the number of internet users affected by cryptocurrency mining software has jumped by a considerable margin this year, when compared to last...

By Andy Walker 29 Jun 2018

Youth might be at risk online with too much data sharing
Youth might be at risk online with too much data sharing

As Youth Month draws to a close, I am concerned about data and the security issues that pertain to it. Where do millennials stand in this era of unlimited data and heightened vulnerability?

By Manie van Schalkwyk 27 Jun 2018

Harnessing blockchain technology to transform global cybersecurity
Harnessing blockchain technology to transform global cybersecurity

In a digitally driven world, cybersecurity has become a highly lucrative sphere of modern business. Today, experts around the world are clawing for a piece of the estimated $8.5bn cyberthreat intelligence industry pie...

By Colin Thornton 17 May 2018

Emilar Gandhi, public policy manager for the SADC region for Facebook | Photo: Jessica Tennant
Facebook Africa, Digify Africa launch online safety programme for SA youth

Facebook Africa and Digify Africa have partnered to launch an online safety programme called Ilizwe Lam, Xhosa for my world...

By Jessica Tennant 25 Apr 2018

The smart hotel of the future: How to leverage IoT to create the guest experience
The smart hotel of the future: How to leverage IoT to create the guest experience

Regardless of the size or type of property, every hotel operator that wants to remain competitive and relevant will have to embrace IoT devices and related wireless innovations over the next year to enable next-generation guest experiences...

By Pieter Engelbrecht 25 Apr 2018

This is how AI will change the way you drive
This is how AI will change the way you drive

While there have been some recent setbacks (and there will doubtless be more) it appears that, with the massive investments in R&D, driverless cars will one day become a reality...

By Sherry Zameer 18 Apr 2018

Three reasons BYOD dominates in tourism
Three reasons BYOD dominates in tourism

'Bring your own device' is frowned upon in many professional sectors, with legitimate fears around data security. Hospitality-based businesses, however, should not ignore the fact that their market is dedicated to a culture of BYOD...

By Wynand Smit 12 Apr 2018

Cybercrime is everywhere because businesses aren't educating
Cybercrime is everywhere because businesses aren't educating

Cybercrime has overtaken all other types of crime as humans have embraced digital technology without really understanding it...

By Simeon Tassev 11 Apr 2018

Don't spend another cent on cybersecurity until real risks have been assessed
Don't spend another cent on cybersecurity until real risks have been assessed

IT security has become a business necessity against the backdrop of proliferating threats from the web, malware and cyber extortion...

By Charl Ueckermann 6 Apr 2018

How to avoid falling prey to a Facebook/Cambridge Analytica-type scandal
How to avoid falling prey to a Facebook/Cambridge Analytica-type scandal

Following revelations that Cambridge Analytica exploited the personal data of millions of Facebook users, the social network is finding itself in a remarkably anti-social predicament...

By Ilse van den Berg 26 Mar 2018

A cybercriminal's tricks and trades to get into your phone
A cybercriminal's tricks and trades to get into your phone

While analysts figure out new methodologies for analysing malware and users begin to understand how all this works, cybercriminals are seeking new ways to hide in phones and compromise devices, says Carey van Vlaanderen, CEO of ESET Southern Africa...

By Carey van Vlaanderen 23 Mar 2018

2018 hospitality IoT trends: Creating a home away from home
2018 hospitality IoT trends: Creating a home away from home

There's a seismic shift happening in the hospitality industry, forcing businesses to take their wireless infrastructure beyond just offering free Wi-Fi, to enabling next-generation guest journeys. Here are the four most important IoT and wireless trends for the coming year...

By Pieter Engelbrecht 8 Feb 2018

Tips for C-level employees when managing IT security risks
Tips for C-level employees when managing IT security risks

Although most companies have invested in IT security solutions focussing on mitigating threats like viruses and malware, many fall short of addressing more sinister risks such as fraud, identity theft and espionage...

By Charl Ueckermann 2 Feb 2018

#BizTrends2018: Alternative payment methods gaining ground in corporate travel
#BizTrends2018: Alternative payment methods gaining ground in corporate travel

Sometimes necessity is the mother of invention, and sometimes invention is spurred by convenience. Business travellers increasingly use not one or two, but three or four different payment mechanisms throughout the duration of their trip...

By Pascalle Albrecht 25 Jan 2018

How to avoid disaster in the wake of Spectre and Meltdown
How to avoid disaster in the wake of Spectre and Meltdown

Earlier this month, while the majority of South African business owners were still enjoying their summer holiday, the global technology industry suffered a rather devastating blow...

By Colin Thornton 23 Jan 2018

#BizTrends2018: The developing cyberthreat landscape
#BizTrends2018: The developing cyberthreat landscape

2017 saw many organisations across the globe fall victim to some very serious cyberattacks. The reality is that the cybercriminal industry is growing - leaving many wondering when, and if, their business will be 'next on the list' and what the consequences will be...

By Riaan Badenhorst 15 Jan 2018

#BizTrends2018: Business intelligence trends to watch in 2018
#BizTrends2018: Business intelligence trends to watch in 2018

The move towards digital has become a prominent feature on the corporate agenda. And while it will assist in ensuring future competitiveness, it will not be achieved overnight...

By Yolanda Smit 11 Jan 2018

#BizTrends2018: Gearing up for a world of connected things
#BizTrends2018: Gearing up for a world of connected things

Deon Liebenberg, head of IoT at Vodacom, gives his insights on what will happen on the IoT landscape in 2018 and beyond...

By Deon Liebenberg 11 Jan 2018

Telltale indications that your WordPress site been hacked
Telltale indications that your WordPress site been hacked

Hacking has become a growing concern for website owners all over the world. Every year, thousands of WordPress websites are either compromised or hacked...

By Charles Mburugu 2 Jan 2018

57 million riders, drivers affected by Uber breach
57 million riders, drivers affected by Uber breach

Global transportation technology company Uber Technologies has admitted it suffered a breach that saw hackers stealing the personal information of approximately 57 million customers and drivers...

By Simon Campbell-Young 13 Dec 2017

By Arthur Buliva (Own work) , via Wikimedia Commons
Speakers announced for Africa Tech Summit Kigali 2018

The first 25 speakers from leading tech companies across Africa have been announced for the upcoming Africa Tech Summit Kigali...

By Tom Jackson 27 Nov 2017

Next >