Home » latest tech news » Page 15

latest tech news

The Mindset Needed for a Successful Digital Transition

Digital transformation is not a new concept, and South African businesses have steadily evolved and increased their inclusion of digital tools over time, with a faster influx happening over the past three years. The adoption rate has accelerated due to the pandemic. Businesses were forced to adopt new ways of working, and digital transformation forms part of that. In some industries, readily available client options have increased as internet speed has also improved. But how do companies determine what kind of digital intervention is needed for their business and who to partner with? According to Ian Nel, Strategic Planning & Programs Director at Canon Southern Africa, it comes down to people, process and then technology. “Digital adoption starts with understanding the needs of the env...

LinkedIn: Are There Cyber-Risks Lurking Beneath the Surface?

In February 2021, the data from 500 million LinkedIn users was leaked by hackers, in June 2021, more than 700 million LinkedIn users had their data leaked and put up for sale. In June 2022, the FBI said that the fraud on LinkedIn posed a significant threat to the platform and its users. The site has become one of the riskiest social media platforms to date, according to South Africa-based cybersecurity firm Nclose. It allows for users to reveal deeply personal and relevant business information without authorisation; it allows for fraudsters to impersonate employees, and gain trust and access to information which can potentially put a company’s reputation on the line if an employee posts libellous or unpleasant content. “By now, most people recognise that social media isn’t the place to put...

The 10 African Countries With the Highest Fuel Prices

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

The Role of Mobile Money in Kenya’s Tech Surge

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Is Bitcoin the Next Global Reserve Currency?

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Rwanda Breaks Ground on Africa’s First mRNA Vaccine Factory

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

South Africa’s Manufacturing Sector is Shaken, says Absa

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Update Your Security Strategy Based on Key Information Learned About Threat Actors, Advises Netskope

The reality of the cyber threats posed today is that many threat actors are not rogue operators acting on their own but are, instead, working as part of sophisticated and organised groups, collaborating with other groups within a wider ecosystem of specialists. These groups build significant financial resources over time, derived from the proceeds of commercially-driven attacks, or gathered as payment from states sponsoring or directly commissioning their activities. This is according to Yaroslav Rosomakho, Field CTO of Netskope, a global cybersecurity leader which is redefining cloud, data, and network security to help organisations apply Zero Trust principles to protect data. He explains: “Threat actors use these resources to improve their subsequent attacks, paying for infrastructure or...

South Africa’s CipherWave Gets Cloud Boost Thanks to Nutanix

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

3 Freelancing Life-Hacks for Young Pros in the Modern Working World

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

3 Freelancing Life-Hacks for Young Pros in the Modern Working World

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

3 Freelancing Life-Hacks for Young Pros in the Modern Working World

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.