Enterprise AI hits the wall

Enterprise AI is outgrowing the architecture and infrastructure beneath it as data privacy and sovereignty requirements tighten, according to new research from NTT Data. The latest research finds a widening split between enterprises that are redesigning AI for...

Information integrity passes geopolitics as the top risk

Information integrity risk, caused by the proliferation of AI‑enabled decision-making and uncertain AI transparency requirements, gained the top rank of emerging risks for the first quarter of 2026, according to Gartner. The Gartner Quarterly Emerging Risk...

SA skills gap: Where talent supply and employer demand collide

South Africa faces a persistent disconnect between the talent available in the labour market and the qualifications that employers are seeking, according to the latest Pnet Job Market Trends Report for April. Around half (54%) of job adverts posted in the last 12...

SA’s key industries come under fire from DDoS attacks

South Africa has become one of the most targeted countries globally for distributed denial-of-service (DDoS) attacks against certain key industries, including financial and computer services. New data from NetScout’s Threat Intelligence Report for the second half of...

Despite barriers, AI deployments are set to accelerate

New research commissioned by IBM has found that about 42% of enterprise-scale organisations (over 1 000 employees) surveyed have AI actively in use in their businesses. Early adopters are leading the way, with 59% of responding enterprises already working with AI...

Global real GDP growth of 2,3% forecast for 2024

Weaker annual real GDP growth rates are forecast across the largest regions in 2024 compared to 2023, according to a new S&P Global Market Intelligence report. The newly published Top-10 Economic Predictions for 2024 forecasts global real GDP will expand at 2,3%...

SA riots and limitations on insurance claims

Businesses seeking to recover losses from the widespread damage caused by recent riots and looting need to act promptly in filing claims to SASRIA, write Lisa Swaine and Maria Philippides from Weber Wentzel As vandalism, looting, damagee and destruction course through...

Travellers cautioned about hotel Wi-Fi

With travelling on the rise again, experts warn about the risks public Wi-Fi in hotels may pose and, as 50% of people choose to travel domestically, this puts the data of a lot of travelers in danger. "As noticed by the FBI, hackers often use hotel Wi-Fi to attack...

SA leans toward dystopian tech future unless moves are made soon

South Africa could face a dystopian technological future, unless moves are made to harness technology for societal good now. This is according to Johan Steyn, chair of the Institute of Information Technology Professionals South Africa (IITPSA) Special Interest Group...

Microsoft continues reign as most imitated brand for phishing

In a quarter that saw Microsoft warn of a new Russian Nobelium phishing campaign, the technology giant was again the brand most frequently targeted by cybercriminals, as it was in both Q1 2021 and Q4 2020. This is according to Check Point's latest Brand Phishing...

The return of the USB in cyberthreats

Kaspersky experts have uncovered a rare, wide-scale advanced persistent threat (APT) campaign against users that was first detected in Southeast Asia, identifying about 1 500 victims, some of which were government entities. Initial infection occurs via spear-phishing...

Never use dye-stained notes from ATMs

ATMs are an essential part of our country's economic infrastructure providing vital services to communities and during the recent civil unrest hundreds of them were destroyed, hampering the ability of bank customers to access cash and other financial services. The SA...

SA riots: Does force majeure apply?

Businesses experiencing disruption from the recent events in South Africa may be able to invoke force majeure clauses in contracts, or the law of supervening impossibility, depending on the circumstances, write Webber Wentzel's Michael Straeuli and Dominic Harris. The...

Will SANDF protect vandalised telecoms infrastructure?

The civil unrest has resulted in numerous telecommunications and broadcasting infrastructure being destroyed. By Peter Grealy and Nozipho Mngomezulu from Webber Wentzel South Africa's telecommunications and broadcasting Regulator, the Independent Communications...

More News Today

PwC achieves better backups with Veeam

Like many companies, PricewaterhouseCoopers South Africa (PwC) hoped its legacy backup solution for physical servers would perform just as well in a virtualised environment. But as the company approached complete virtualisation, says Senior Manager for Hosted Services...

Kaspersky products win in Dennis testing

Kaspersky Labs is proud to announce that its products, Kaspersky Endpoint Security for Business and Kaspersky Small Office Security, have both earned first place in quarterly independent testing performed by Dennis Technology Labs in categories for corporate security...

BYOD sounds good, but is it practical?

Since the beginning of the year I have been running a bring your own device (BYOD) experiment, writes Peter Scheffel, chief technology officer at bbd. No I’m not talking about my own phone or my own iPad. These devices, while they are capable of doing some work in the...

IBM, Datawatch turn ECM into data insights

Datawatch and IBM have announced the industry's first integrated content management and analytics solution that lets IBM Content Manager OnDemand (CMOD) users gain insight from big data trapped within their CMOD systems. The first of its kind, this-self-service...

Automation the key challenge this decade

“Shifting to business process automation is the biggest technological change CEOs will face this decade,” says Alexander Mehlhorn, CEO of software development company Framework One. “The rise of smart machines will force an evolution in the way we work and give rise...

Digital forensics uncovers the truth

What if an employee visits the Human Resources Department with allegations that a colleague sent them offensive e-mails? What if the suspected employee deleted certain files from their computer? What would you do? Digital Forensics can retrieve deleted files and allow...

The Internet of Things craze

The term the Internet of Things (IoT) was conceived when the Massachusetts Institute of Technology set up the Auto ID Centre in 1998. It focused on applying an electronic tag (RFID) to all items, effectively connecting them to a wider network - the Internet, says...

Oracle announces Utilities Data Model

Oracle has announced Oracle Utilities Data Model, a pre-built standards-based data warehouse schema and set of business intelligence dashboards designed to help utilities analyze growing smart grid and other enterprise data and quickly drive new business intelligence...

How to diagnose a security breach

A popular maxim today is that there are only two kinds of companies – those who have been breached, and those who have been breached but don’t know about it. Given that recent research has revealed that the average advanced persistent threat lurks on a business...

Itec Group launches Itec Shared Services

With the office automation, software, PBX and telecommunications industry rapidly evolving, companies in this market must continuously innovate and change with shifting client requirements to stay competitive. In light of this, Itec has launched Itec Shared Services –...

Technical Lead (PHP) (CPT Hybrid) – Western Cape Somerset West

ENVIRONMENT:PROVIDE overall architectural guidance ensuring work is performed at optimal levels while offering technical Pre-sales support and oversight of the Conversation Automation stack as the next Technical Lead (PHP) sought by a cutting-edge Tech company in...

Migration Business Analyst – Western Cape Cape Town

Objective of the role:The purpose of the role is to work collaboratively within the Platform migration team and across other teams in the business to deliver exceptional customer experiences.Key ResponsibilitiesManage, facilitate, and drive the extraction criteria,...

Integration Developer

MINIMUM REQUIREMENTSQualification: An Appropriate IT Qualification (Diploma/Degree)Sc. or National Diploma in Computer Science (recommended).Industry recognised software development certifications.Experience: 2- 3 years' work experience as a software developer.2 - 3...

Network Engineer

ENVIRONMENT:A dynamic provider of IT Connectivity Solutions seeks an ambitious and technically skilled Network Engineer to join its team where you will be expected to travel to clients and provide exceptional support. Your role will also entail managing Data, VoIP...

Software Engineer Java

Seeking a candidate with a minimum of 3 years of experience in Software Engineering, preferably based in Cape Town. This position offers a hybrid work model, requiring attendance in the office once a week.We provide a flexible work environment, fostering a great...

Senior Angular and Vue.Js Web Developer at M&M Consulting

You will be responsible for building, co-ordinating and managing many websites using Angular and [URL Removed]You must be profound in understanding integration between front end and backend structures.We are looking for someone with the ability to conceptualise and...

Integration Developer – Gauteng Johannesburg

MINIMUM REQUIREMENTSQualification: An Appropriate IT Qualification (Diploma/Degree)Sc. or National Diploma in Computer Science (recommended).Industry recognised software development certifications.Experience: 2- 3 years' work experience as a software developer.2 - 3...

Network Engineer – Western Cape Cape Town

ENVIRONMENT:A dynamic provider of IT Connectivity Solutions seeks an ambitious and technically skilled Network Engineer to join its team where you will be expected to travel to clients and provide exceptional support. Your role will also entail managing Data, VoIP...

Software Engineer Java – Western Cape Woodstock

Seeking a candidate with a minimum of 3 years of experience in Software Engineering, preferably based in Cape Town. This position offers a hybrid work model, requiring attendance in the office once a week.We provide a flexible work environment, fostering a great...

View more career listings on our Careers Section