Continuous threat exposure management the new cybersecurity imperative

The old playbook of periodic vulnerability scans and annual security audits no longer suffices when attackers operate in real time, using automation and artificial intelligence (AI) to exploit the tiniest cracks in digital defences. By Saurabh Prasad, senior solution...

Red Hat and Google Cloud expand collaboration

Red Hat has announced an expanded collaboration with Google Cloud to help organisations accelerate application modernisation and cloud migrations. The expansion introduces Red Hat OpenShift in the Google Cloud console, deeper integrations with Google Cloud services...
Vertiv expands thermal portfolio

Vertiv expands thermal portfolio

Vertiv has launched the Vertiv CoolPhase Wall, a space-saving, wall-mount cooling system designed for small IT spaces and edge environments. The system is designed for the needs of IT equipment, removing heat and enabling continuous operation while taking up zero...

Top 10 cybersecurity trends and terrors of 2026

There is one word that describes cybersecurity right now, writes Jeanette Simpson, head of product management at Armata Cyber Security, and that’s ‘acceleration’. Attacks are scaling faster. Ransomware activity has increased 25% year-on-year and the number of...

Rethinking power for Africa’s data centres

  Africa’s digital economy is scaling faster than its power systems. Cloud regions, artificial intelligence (AI) workloads, fintech, health platforms and government digitisation are all driving a wave of new data centres across the continent. By Mourad Younes,...