Innovation drives SA’s banks to quicker cloud adoption

Innovation drives SA’s banks to quicker cloud adoption

After many years of hype, with less change, banks are now faced with the pressure to keep up with the pace of technological innovation and an urgent need to adopt more efficient processes such as innovative mobile banking. Legacy IT systems pose numerous limitations...
Banks look to AI for KYC compliance

Banks look to AI for KYC compliance

The Middle East and Africa’s banking and finance industry spent $12,68-billion on information and communications technology (ICT) in 2019, according to the latest insights from International Data Corporation (IDC). The global technology research, consulting, and...
Outdated, misaligned strategies seen at biggest risk for business

Outdated, misaligned strategies seen at biggest risk for business

Concerns that the assumptions underpinning organisational strategy may be outdated or misaligned to current growth objectives topped business leaders’ concerns in Gartner’s latest Emerging Risks Monitor Report. Gartner surveyed 136 senior executives across industries...
Previously hyped innovations becoming reality

Previously hyped innovations becoming reality

Many of the hyped services and products that have been “just around the corner” for years are finally turning that corner and will become a reality in 2020, according to the latest edition of Deloitte’s Technology, Media & Telecommunications...
MWC cancelled over Covid-19 fears

MWC cancelled over Covid-19 fears

In an unprecedented move, Mobile World Congress 2020 has been cancelled as concerns over the Covid-19 epidemic rise. The GSMA has issued the following statement: “Since the first edition of Mobile World Congress in Barcelona in 2006, the GSMA has convened the...
It’s getting easier for cybercrooks to access your networks

It’s getting easier for cybercrooks to access your networks

A massive 60% of initial entries into victims’ networks that were observed leveraged either previously stolen credentials or known software vulnerabilities, allowing attackers to rely less on deception to gain access. This is one of the findings from the...