Bank accounts come under attack
More than one million online banking accounts were compromised by infostealers last year, as financial cyberthreats shifted toward credential theft and data reuse. Attackers are moving away from traditional PC banking malware and increasingly relying on social...
Open source after Mythos
There is a pattern we keep seeing in technology, writes Rob Thomas, senior vice-president of IBM Software and chief commercial officer of IBM. When software moves from product to platform and then from platform to infrastructure, the rules change. At the product...
Nedbank plans blockchain for African solutions
Nedbank, through a strategic partnership with Crypto.com, will use blockchain technology and digital assets to develop advanced payment, settlement and liquidity solutions across Africa, subject to compliance with the necessary regulatory requirements. As global trade...
Multichoice to can Showmax
Mutlichoice will shut down its movie streaming service Showmax. According to communication sent to customers, the company has experienced substantial losses such that the Showmax business is no longer sustainable. MultiChoice says it will rather focus on strengthening...
Cyber risks increase as Middle East war escalates
The Sophos X-Ops Counter Threat Unit (CTU) has issued a cyber advisory warning of increased cybersecurity risks as the US-Israel-Iran conflict continues and escalates. Historically, periods of direct military escalation in the Middle East have correlated with...
SA organisations see a rise in malicious insider threats
Mimecast’s ninth annual State of Human Risk Report reveals that 46% of SA organisations reported an increase in malicious insider incidents over the past year – matching the 46% of local organisations reporting a rise in negligent incidents for the first time. This...
Threat actors ramp up sophistication of DDoS attacks
Sophisticated attacker collaboration, resilient botnets and compromised IoT infrastructure drove more than eight million DDoS attacks worldwide – some as large as 30 terabits per second (Tbps) – in the second half of 2025. According to NetScout Systems’ 2025...
The secret sauce, the Pentagon, and the greatest PR campaign in history
By Barry Buck - I’ve said it so many times it’s basically my catchphrase: “I don’t know how they do it, but Anthropic has the secret sauce. They’re just better than every single one of their competitors – and it’s not even close.” Turns out the Pentagon agrees with...
Disruptive technologies like AI and robotics will reshape the future of work
Artificial intelligence (AI) and robotics are the central disruptive technologies that will transform work and workplaces, and this disruption is already underway. However, technologies like autonomous vehicles (AVs) and the Industrial Internet also have important...
Supply chain attacks top 2025’s threats
Supply chain attacks have emerged as the most common cyberthreat facing businesses over the past year, a new Kaspersky global study shows. The findings reveal that nearly every third company globally had to confront a supply chain threat over the past year. According...
More News Today
Situational awareness a frontline imperative for first responders
The ability to see, act and understand events in real time is changing the face of emergency response and the speed at which lives are saved. By Reshaad Sha, executive chairman of Sentiv For decades, this visibility was built on two-way radios, CCTV cameras and...
The invisible culprit holding back ‘smart’ infrastructure
In many ‘smart’ buildings, energy, water, and waste are carefully accounted for. But talk to the people inside, and you hear a different story: heavy air, humidity complaints, stuffy meetings, even equipment sweating in server and plant rooms. By Wynand Deyzel,...
UJ’s CTS project office boosts efficiencies
The University of Johannesburg’s (UJ) Central Technical Services (CTS) project office has significantly enhanced its project portfolio management (PPM) practices through recommendations made following a comprehensive diagnostic maturity assessment provided by Project...
Building resilient municipal infrastructure through insurance collaboration
In April 2022, heavy rains caused catastrophic flooding in KwaZulu-Natal, claiming over 400 lives and damaging infrastructure, businesses, and homes. The eThekwini Municipality infrastructure damage cost about R25-billion. The disaster exposed vulnerabilities in...
The next evolution of IT integrates infrastructure, intelligence, security
For years, cloud and security have been equally important but separate line items in the corporate budget, managed by different teams, often with different strategies and priorities. By Richard Vester, chief executive: cloud at iOCO The addition of AI has followed...
Keeping AI on the right side of cybersecurity
AI now sits on both sides of the cybersecurity coin. Criminals use it to automate phishing, while defenders rely on it to spot the tiny anomalies humans miss. South African organisations might be tempted to jump in as quickly as possible, but questions of...
Turn construction payroll challenges into project wins
Construction payroll is a mission-critical function that can make or break the success of a company’s projects. When it runs smoothly, projects deliver on time and in budget. But when it falters, the knock-on effects can throw projects off course, straining client...
SMEs need data loss prevention in the age of AI
In today’s fast-paced digital world, small businesses are just as susceptible to data breaches as large enterprises - if not more so. By Dillon Gray, chief operating officer at IPT The rise of AI tools, particularly generative AI, has added new layers of complexity...
What to do when you’re put on a PIP
Perhaps this is your current situation: being placed on a Performance Improvement Plan (PIP) can feel like a punch to the gut. It’s feedback but it also comes loaded with fear, doubt and worry: “Am I failing? Is my job at stake? Do they even want me here?” By Anja van...
Kaspersky rolls out Cloud Workload Security update
Kaspersky has announced the release of an enhanced version of its Kaspersky Cloud Workload Security (CWS), delivering advanced protection for hybrid and multicloud environments. Security challenges constantly pose a threat to organisations’ cloud infrastructures. In a...
Online Administrator at PnP – Western Cape Kenilworth
Role SummaryTo support the organization by efficiently managing employee schedules, maintaining accurate workforce data, ensuring compliance with labor regulations, and assisting with key HR administrative functions. The Workforce Administrator plays a vital role in...
SAP Basis Administrator – Western Cape Cape Town CBD
Take ownership of high-performing SAP environments in a role where your expertise truly matters. Is this you? You're technically strong, structured, and enjoy solving complex system challenges. With a keen eye for detail and a proactive mindset, you take pride in...
Online Administrator at PnP
Role SummaryTo support the organization by efficiently managing employee schedules, maintaining accurate workforce data, ensuring compliance with labor regulations, and assisting with key HR administrative functions. The Workforce Administrator plays a vital role in...
Full Stack Developer (Senior) 1613
Analyze business requirements and technical specifications to design and develop the backend architecture of software applications / platforms.Select and implement appropriate programming languages, frameworks, and databases to meet theapplication's functional and...
Senior Specialist CX and UX Designer – Gauteng Presas
Key Responsibilities: Shape, design, and guide customer and user experience strategies to solve complex problems.Lead the development of complex, multifaceted business process solutions.Ensure that Organisation services are structured according to the needs,...
Software Engineer @ – Gauteng Johannesburg
Software Engineer ContractorMid-Career (4 - 6 yrs exp)Gauteng or Cape TownKEY RESPONSIBILITIES:Rapid prototyping of approved AI use casesApplication and agent implementationAPI and enterprise system integrationDeployment and release executionMonitoring and production...
Business Analyst ( 12 Months Contract )
Role Summary To investigate, document and implement technology systems. The incumbent will assist the development team with the required project documentation, testing and user communication. Furthermore, will act as the key link between business stakeholders, project...
Data Engineer
To prepare data products and advance technical thought leadership for the Enterprise, to deliver fit for purpose data products for consumption by advanced analytics. Provide clean, usable data to whomever may require it. Role Overview:A Data Engineer designs, builds,...
Business Analyst ( 12 Months Contract ) – Gauteng Johannesburg Region
Role Summary To investigate, document and implement technology systems. The incumbent will assist the development team with the required project documentation, testing and user communication. Furthermore, will act as the key link between business stakeholders, project...
Data Engineer – Gauteng Edenburg
To prepare data products and advance technical thought leadership for the Enterprise, to deliver fit for purpose data products for consumption by advanced analytics. Provide clean, usable data to whomever may require it. Role Overview:A Data Engineer designs, builds,...
View more career listings on our Careers Section