L-R VP and MD of Ericsson South and East Africa, Todd Ashton, Telkom CEO, Mugo Kibati and NEC XON GM Wireless, Willem Wentzel. Telkom Kenya Limited, the Helios Investment Partners and Government of Kenya joint venture, has signed a memorandum of understanding (MOU) with Ericsson, the telecommunications company, and NEC XON, the systems integrator, to add 2,000 wireless sites onto Telkom Kenya’s network by 2023. The approximately $100-million nationwide rollout is part of Telkom Kenya’s long-term network expansion strategy announced in August last year when it began its strategic digital transformation reorganisation, as well as lay the groundwork towards the company’s long-term goal to become the technology partner of choice in Kenya and the region. Telkom Kenya has identified its fibre in...
Image sourced from Shutterstock. NETSCOUT’s ATLAS Security Engineering and Response Team (ASERT) observed a record-setting 5.4 million attacks in the first half of 2021, further confirmation that their “up and to the right” mantra would continue to hold true. As the findings from the 1H 2021 NETSCOUT Threat Intelligence Report show, the ongoing surge in DDoS activity is just one aspect of the dramatic global impact cyberattacks continue to have on private and public entities. “Cybercriminals are making front-page news launching an unprecedented number of DDoS attacks to take advantage of the pandemic’s remote work shift by undermining vital components of the connectivity supply chain,” stated Richard Hummel, threat intelligence lead, NETSCOUT. “Ransomware gangs added triple-extortion ...
When cyberattacks are on the rise, as they certainly have been in South Africa this year, an organisation cannot afford to have its cybersecurity operating in a reactive manner. And yet, far too many businesses operate in this manner, making them prime targets for a breach. This is according to Milad Aslaner, Senior Director, Cyber Defense Strategy at SentinelOne, which helps organisations to prevent, detect, respond to and remediate end-point threats using artificial intelligence (AI) and machine learning. Its endpoint security products are distributed throughout Africa by Networks Unlimited. Aslaner explains: “Endpoints including laptop computers, tablets, and phones provide entry points to a wider network penetration that could harm the organisation, and which is one of the goals of ran...
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent. You Deserve to Make Money Even When you are looking for Dates Online. So we reimagined what a dating should be. It begins with giving you back power. Get to meet Beautiful people, chat and make money in the process. Earn rewards by chatting, sharing photos, blogging and help give users back their fair share of Internet revenue.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent. You Deserve to Make Money Even When you are looking for Dates Online. So we reimagined what a dating should be. It begins with giving you back power. Get to meet Beautiful people, chat and make money in the process. Earn rewards by chatting, sharing photos, blogging and help give users back their fair share of Internet revenue.