Strong passwords can’t save you from AI, infostealers and the Telegram Underground
Welcome to the real World Password Day 2026 (today, 7 May), and it's not the one where we remind you to add an exclamation mark to "Password123”. By Shayimamba Conco, security evangelist: Africa at Check Point Software Technologies This year's World Password Day is...
AI-enabled attacks drive ransomware surge
Cybercrime no longer functions as a series of isolated campaigns. Today, it operates as a system, with malicious hackers operating across an end-to-end life cycle and compressing the attack life cycle with shadow agents. This is the headline finding from the 2026...
EdTech really isn’t all about AI
EdTech specialist, Injini, has released the fourth edition of its African EdTech Insights Report, questioning whether the technology being deployed in African schools is actually serving the purpose its designed for. Titled "When Technology Meets the Classroom: What...
Capetonians face high air pollution risk
More than 40% of Cape Town’s metropolitan population is exposed to high or very high levels of air pollution, according to a new study by the University of Cape Town (UCT) which has produced the first high-resolution map of air pollution risk across the area. The...
Memory and SSD shortage set to impact SA
The memory and SSD crisis is real – and it’s broader and faster‑moving than many in the IT industry expect. This is the stark warning from Craig Nowitz, CEO of Syntech, who recently returned from the Hong Kong electronics shows and a week of factory visits in China....
Strategic wireless investments drive higher ROI in the AI era
WiFi has evolved into a strategic growth engine capable of delivering a multiplier effect - where a single network investment drives compounding returns across employee productivity, customer engagement and revenue. This is the headline finding from Cisco’s new State...
World’s most trusted brands are cybercriminals’ entry point of choice
Check Point Research (CPR), the Threat Intelligence arm of Check Point Software Technologies, has released its Brand Phishing Ranking for Q1 2026. The latest findings show that Microsoft remained the most impersonated brand, appearing in 22% of all phishing attempts...
Ransomware, AI drive shift from recovery confidence to proven data resilience
There is a growing disconnect between how confident organisations feel about cyber resilience and the reality of recovery outcomes, according to Veeam’s latest Data Trust and Resilience Report 2026. As ransomware, regulatory pressure, and AI-driven data risk grow,...
Encryption crisis looms as Q-Day moves to 2029
The cybersecurity industry has long treated Q-Day – the point at which quantum computing shatters current encryption standards – as a distant, theoretical problem. However, this complacent timeline has been rather aggressively upended. As highlighted by Richard Ford,...
SA’s procurement problem isn’t cost – it’s capability
A new global report from the Chartered Institute of Procurement & Supply (CIPS), the global professional body for procurement and supply with a presence in over 180 countries, has revealed a fundamental shift in how organisations manage procurement, with...
More News Today
Start of the year exposes the true cost of manual workflows
As organisations return to full operational pace after the December break, the early months of the year often reveal uncomfortable truths about how work gets done. Backlogs resurface, approvals stall, and employees spend the first weeks of the year chasing documents,...
When banking apps fail, customer trust is the casualty
South Africans have embraced digital banking as part of everyday life. From paying bills and sending instant payments to managing investments and applying for credit, the banking app has become the primary touchpoint between customer and institution. By Nitesh Singh,...
Practical steps to building a data foundation for business AI
As more South African organisations accelerate their adoption of artificial intelligence, they are confronted by a familiar obstacle: the data simply isn’t ready. By Wayne Meisel, chief of staff and senior business manager at SAP Africa AI can only perform as well as...
AI is silently turning into your organisation’s biggest cyber threat
AI didn’t storm in with board approval or a security checklist, writes By John Mc Loughlin, CEO of J2. It crept in unnoticed, drafting emails faster than you can read them, generating code on the fly, automating workflows behind the scenes, and empowering support...
The challenge is data sovereignty
As geopolitical tensions rise and global data laws tighten, data sovereignty has moved from an IT consideration to a board-level imperative. Lee Syse, director of evoila Africa, previously Routed, says that for organisations operating in regulated industries and...
Vertiv expands IT management portfolio
Vertiv has introduced the Vertiv Avocent MergePoint Unity 2, a next-generation KVM switch platform for secure, centralised management of IT devices across enterprise data centre environments, distributed edge locations and branch office environments. Designed to help...
RS Group partners with SolarAid
RS Group has announced a new three-year partnership with international development charity SolarAid. Together, RS Group and SolarAid aim to deliver clean, safe solar lights to 150 000 people living in rural communities across Africa without access to electricity. By...
Developers step up in Huawei’s Code4Mzansi competition
The Huawei developer competition, Code4Mzanzi, has kicked off in partnership with the Department of Small Business Development and various academic institutions, including the University of Cape Town, the University of Johannesburg, the University of Pretoria, and the...
Unpacking Africa’s shifting landscape of data, cloud and sovereignty
Over the past few years, the data centre industry has undergone a profound digital transformation as organisations across various sectors continue to aggressively collect, store and analyse vast volumes of data, now called data modeling. By Wiaan Vermaak, group chief...
AI and cybersecurity: Trust must come before scale
As artificial intelligence continues its rapid move from experimentation into production environments, 2025 marked a turning point for how organisations approach AI adoption – particularly in the context of cybersecurity, governance and enterprise risk. According to...
Senior Web Developer
Responsibilities / Key Tasks Maintain and enhance existing functionality, while designing and developing new components to support evolving business needs. Develop a deep understanding of the current product architecture and business domain, collaborating with...
PMO Analyst
The PMO Analyst will provide structured administrative, analytical, and coordination support within the Information Technology function to enable the successful delivery of projects. The role supports the Program Manager in maintaining project governance, ensuring...
Senior Web Developer – Gauteng Johannesburg
Responsibilities / Key Tasks Maintain and enhance existing functionality, while designing and developing new components to support evolving business needs. Develop a deep understanding of the current product architecture and business domain, collaborating with...
PMO Analyst – Gauteng Johannesburg
The PMO Analyst will provide structured administrative, analytical, and coordination support within the Information Technology function to enable the successful delivery of projects. The role supports the Program Manager in maintaining project governance, ensuring...
Machine Learning Engineer (Python) (Remote)
ENVIRONMENT:A Machine Learning Engineer with a strong foundation in computer vision is sought by a provider of cutting-edge Tech Applications. Your core role will be to improve the quality and reliability of the deployed detection and classification models. This is a...
Solutions Architect (Cisco Infrastructure)
Role PurposeKey ResponsibilitiesDesign end-to-end WAN architecture (SD-WAN, MPLS, hybrid connectivity) Ensure high availability, redundancy, and automated failover Define security architecture and secure access to systems, internet, and partners Design Primary &...
Machine Learning Engineer (Python) (Remote) – Western Cape Cape Town
ENVIRONMENT:A Machine Learning Engineer with a strong foundation in computer vision is sought by a provider of cutting-edge Tech Applications. Your core role will be to improve the quality and reliability of the deployed detection and classification models. This is a...
Solutions Architect (Cisco Infrastructure) – Gauteng Midrand
Role PurposeKey ResponsibilitiesDesign end-to-end WAN architecture (SD-WAN, MPLS, hybrid connectivity) Ensure high availability, redundancy, and automated failover Define security architecture and secure access to systems, internet, and partners Design Primary &...
SAP Administrator
Our client, a leading mining company is looking to appoint a SAP Administrator for a 12-month renewable contract position based in Kathu, Northern Cape. The SAP Administrator will be responsible for providing a range of financial administrative assistance to the...
Junior Power BI Developer
Now find new jobs best matched to your skills!Job Title: Junior Power BI Developer - Sandton.Salary: R25,000 to R40,000 + negotiable depending on experience.The OpportunityThis position requires you to turn data into insights for the business. You will support the...
View more career listings on our Careers Section