Latest showcases

More showcases...
2018 hospitality IoT trends: Creating a home away from home
2018 hospitality IoT trends: Creating a home away from home

There's a seismic shift happening in the hospitality industry, forcing businesses to take their wireless infrastructure beyond just offering free Wi-Fi, to enabling next-generation guest journeys. Here are the four most important IoT and wireless trends for the coming year...

By Pieter Engelbrecht 8 Feb 2018

Tips for C-level employees when managing IT security risks
Tips for C-level employees when managing IT security risks

Although most companies have invested in IT security solutions focussing on mitigating threats like viruses and malware, many fall short of addressing more sinister risks such as fraud, identity theft and espionage...

By Charl Ueckermann 2 Feb 2018

#BizTrends2018: Alternative payment methods gaining ground in corporate travel
#BizTrends2018: Alternative payment methods gaining ground in corporate travel

Sometimes necessity is the mother of invention, and sometimes invention is spurred by convenience. Business travellers increasingly use not one or two, but three or four different payment mechanisms throughout the duration of their trip...

By Pascalle Albrecht 25 Jan 2018

How to avoid disaster in the wake of Spectre and Meltdown
How to avoid disaster in the wake of Spectre and Meltdown

Earlier this month, while the majority of South African business owners were still enjoying their summer holiday, the global technology industry suffered a rather devastating blow...

By Colin Thornton 23 Jan 2018

#BizTrends2018: The developing cyberthreat landscape
#BizTrends2018: The developing cyberthreat landscape

2017 saw many organisations across the globe fall victim to some very serious cyberattacks. The reality is that the cybercriminal industry is growing - leaving many wondering when, and if, their business will be 'next on the list' and what the consequences will be...

By Riaan Badenhorst 15 Jan 2018

#BizTrends2018: Business intelligence trends to watch in 2018
#BizTrends2018: Business intelligence trends to watch in 2018

The move towards digital has become a prominent feature on the corporate agenda. And while it will assist in ensuring future competitiveness, it will not be achieved overnight...

By Yolanda Smit 11 Jan 2018

#BizTrends2018: Gearing up for a world of connected things
#BizTrends2018: Gearing up for a world of connected things

Deon Liebenberg, head of IoT at Vodacom, gives his insights on what will happen on the IoT landscape in 2018 and beyond...

By Deon Liebenberg 11 Jan 2018

Telltale indications that your WordPress site been hacked
Telltale indications that your WordPress site been hacked

Hacking has become a growing concern for website owners all over the world. Every year, thousands of WordPress websites are either compromised or hacked...

By Charles Mburugu 2 Jan 2018

57 million riders, drivers affected by Uber breach
57 million riders, drivers affected by Uber breach

Global transportation technology company Uber Technologies has admitted it suffered a breach that saw hackers stealing the personal information of approximately 57 million customers and drivers...

By Simon Campbell-Young 13 Dec 2017

By Arthur Buliva (Own work) , via Wikimedia Commons
Speakers announced for Africa Tech Summit Kigali 2018

The first 25 speakers from leading tech companies across Africa have been announced for the upcoming Africa Tech Summit Kigali...

By Tom Jackson 27 Nov 2017

Image source:
Securing the enterprise network with artificial intelligence

Artificial intelligence (AI) often throws up visions of a futuristic Earth, where self-aware robots are programmed to be ethical in their behaviour and protect human lives at all costs...

By Pieter Engelbrecht 21 Nov 2017

Safeguarding your customers against the threat of identity theft
Safeguarding your customers against the threat of identity theft

A recent data breach exposed the personal information of 30-million South Africans, including emails, ID numbers, addresses and contact numbers, and, in some cases, even passwords...

By Wynand Smit 17 Nov 2017

Colin Thornton
Deep packet sniffing, penetration testing and vulnerabilities: A guide to modern IT security

Yes, I know what you're thinking...this sounds like some kind of twisted geek version of Fifty Shades of Grey. And while I hope our message can instil the same kind of reader and media frenzy as that soft porn novel and film, it is admittedly a far more sombre (and arguably far more important) topic for discussion: IT security and mobility...

By Colin Thornton 16 Nov 2017

NEC/XON Summit 2017: Making Africa smarter and safer
NEC/XON Summit 2017: Making Africa smarter and safer

The NEC/XON ICT Summit 2017 kicked off on Monday, 6 November 2017. Keynote speakers included the likes of Carel Coetzee, CEO of XON and Hironobu Kurosaki, president and CEO of NEC Europe...

By Ilse van den Berg 7 Nov 2017

Database of 30 million+ South Africans leaked online, property group is culprit
Database of 30 million+ South Africans leaked online, property group is culprit

NEWSWATCH: After a database of more than 30 million South Africans had been leaked online, including estimated incomes‚ addresses, and cellphone numbers, one of the country's top real estate companies has admitted to being the unwitting source...

By Ilse van den Berg 19 Oct 2017

Photo by Hannah Wei on Unsplash
Serious Wi-Fi flaw found in WPA2 protocol

NEWSWATCH: A new cybersecurity attack, known as a ‘Krack' attack (key reinstallation attack) has revealed a flaw in Wi-Fi's WPA2's cryptographic protocols... (video)

By Ilse van den Berg 18 Oct 2017

Digital trust: the currency of the future
Digital trust: the currency of the future

Digital trust, in a nutshell, is about the ability to protect the digital data shared across a vast digital ecosystem. And it may just become the currency of the future...

By Paul Williams 21 Jul 2017

The six worst ransomware
The six worst ransomware

It's hard to keep track of the cybercriminal world as it seems these dark web creatures are constantly trying to outwit, outlast, and outplay each other with their destructive viruses...

By Colin Thornton 20 Jul 2017

Colin Thornton
Cyber attacks moving to mobile

With individuals and businesses becoming increasingly dependent on mobile devices for everything from email to banking, cyber criminals have turned their attention to mobile platforms...

By Colin Thornton 7 Jul 2017

Damian Michael
Global companies attacked, Department of Education hacked, are you armed?

Not only did thousands of companies suffer from a severe Petya ransomware attack last week, but closer to home was the hacking of South Africa's Department of Education's system...

By Damian Michael 6 Jul 2017

Global cyberattack source, motives unfold
Global cyberattack source, motives unfold

NEWSWATCH: Following the global cyberattack that affected thousands of businesses last week, reports say it might not have been in an attempt to get money, and Ukraine says it's Russia that's behind it all...

By Ilse van den Berg 3 Jul 2017

New global ransomware attack disrupts thousands of companies
New global ransomware attack disrupts thousands of companies

NEWSWATCH: This week saw another global ransomware attack spread across the globe affecting big companies such as WPP, Maersk, and FedEx, among many others...

By Ilse van den Berg 30 Jun 2017

Department of Education website hacked
Department of Education website hacked

If you're trying to access South Africa's Department of Basic Education's website at present, you can't. It's down. And there's a very good reason why...

By Andy Walker 29 Jun 2017

Boris Dzhingarov
Top five overlooked cybersecurity issues

In the news you will often hear about the most dangerous threats from cyber security experts. These may apply to your organisation but more immediately there are some vulnerabilities to be aware of...

By Boris Dzhingarov, Issued by Monetary Library 22 Jun 2017

Claude Schuck
Managing the value of data

No organisation can survive in the always-on environment without having access to data. Fortunately, better business resiliency is to be had by leveraging the foundation put in place by IT...

By Claude Schuck 14 Jun 2017

Colin Thornton
Combating ransomware [part II]

In a previous article, we examined the rise of ransomware and some of the issues that people need to be aware of when addressing this scourge...

By Colin Thornton 7 Jun 2017

Comabting ransomware [part I]
Comabting ransomware [part I]

Even though local statistics are difficult to come by given the sensitive matter of the issue, ransomware is on the increase in South Africa and the rest of the world...

By Colin Thornton 30 May 2017

Ransomware: more than just file encryption [part II]
Ransomware: more than just file encryption [part II]

Off the back of a previous article on the types of ransomware you may not have been aware of, in this article, we'll look at a few preventative measures to make sure you're protected or able to mitigate the effects of ransomware...

By Doros Hadjizenonos 11 May 2017

Ransomware: more than just file encryption [part I]
Ransomware: more than just file encryption [part I]

While most ransomware families prevent their victims from accessing their documents by encrypting them and offering a decryption key in return for a ransom payment, others use different ways...

By Doros Hadjizenonos 6 Apr 2017

Hackers threaten to reset iCloud accounts, wipe devices
Hackers threaten to reset iCloud accounts, wipe devices

NEWSWATCH: It seems Apple is under a hacking attack... Not only by the CIA but, most recently, by a hacker group called Turkish Crime Family which is threatening to reset iCloud accounts and remotely wipe iPhones...

By Ilse van den Berg 27 Mar 2017

Next >