Cybersecurity fatigue a growing risk in the age of AI-driven attacks

Although the tactics and technologies cybercriminals use have evolved over the past 20 years, phishing and other social engineering attacks are nothing new. But despite the significant amounts of time and money invested in cybersecurity training and awareness,...

Diversified Computing Centres, Enabling a Green and Smart Africa

The 2024 Pan-African DataCentres Exhibition and Conference took place this week at the Sandton Convention Centre. At this gathering nearly 3,000 global data centre energy customers, as well as 120 integrators, consulting firms, and industry associations shared...
The jump, the gun and Microsoft Copilot

The jump, the gun and Microsoft Copilot

Companies need to adopt a project approach to the integration, application and management of Microsoft Copilot, writes Heath Huxtable, executive head at Braintree. Four hundred million paid Office 365 users. That’s how many users have invested into the Microsoft...

Protect digital ID with phone number security

Phone numbers have evolved into essential identifiers, akin to personal IDs and crucial for logging into numerous online services ranging from social networks to banking apps. As such, control over these digits is pivotal, with their loss potentially leading to...
Faster, smarter, more secure connectivity gives you the edge

Faster, smarter, more secure connectivity gives you the edge

It is easy to take technology like connectivity for granted when everything is working as it should. By Mandy Duncan, country manager for HPE Aruba Networking South Africa However, earlier this year as companies across South Africa abruptly lost access to everything...