SA’s economic recovery remains fragile

After nearly two decades of weak growth, declining investment and rising structural constraints, South Africa faces a narrow window in which decisive reforms could determine whether it escapes long‑term stagnation or remains trapped in low growth. Coface research...

In an era of instability, restructuring promotes resilience

The era of corporate stability is over and this is why the most important C-suite appointment companies can make in 2026 is a full-time and continually proactive chief restructuring officer (CRO) in charge of a CRO office. A new Global CRO Study 2026, authored by the...

Global IT spend set for13,5% growth, to $6,31trn

Worldwide IT spending is expected to reach $6,31-trillion in 2026, up 13,5% from 2025, according to the latest forecast by Gartner. “This latest forecast underscores the accelerating momentum in AI infrastructure and advanced memory,” says John-David Lovelock,...

Beware the gap between perceived AI readiness and DR capability

Software-as-a-service (SaaS) data protection is seen as a high priority when implementing AI solutions – but a survey of senior IT decision-makers has revealed a gap between perceived readiness and tested, validated disaster recovery capability. This is among the...

Key trends as fintech borrowing goes mainstream

South Africa’s fintech sector is undergoing rapid transformation, signalling a major shift in how consumers will engage with credit in the next five years, and beyond. As digital adoption accelerates, lenders will need to adapt their approach to South African...

AI-optimised IaaS set to grow AI infrastructure

AI-optimised infrastructure as a service (IaaS) is emerging as the next disruptive growth engine for AI infrastructure. As a result, end-user spending is projected to grow 146% by the end of 2025, according to Gartner. The AI-optimised IaaS market includes spending on...

Large-scale credential theft escalates

Cybercriminals continue to pivot to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined, according to IBM’s newly-released 2025 X-Force Threat Intelligence Index. IBM X-Force observed an 84% increase in...

CATL hints at improved battery technology

Chinese battery manufacturer CATL has announced that it’s working on new technology that would reduce the cost of electric vehicles, while improving their performance. The company aims to produce batteries that are cheaper, lighter and more cold-resistant, with...

Tech to the rescue for near-extinct bears

Biodiversity conservation and human-wildlife co-existence are key priorities for the team at Abruzzo, Lazio and Molise National Park, in the Apennine Mountains of Italy, where the Marsican brown bear is among the park’s residents. To protect and preserve the bear – a...

China outperforms on smartphone market growth

According to preliminary data from the International Data Corporation (IDC) Worldwide Quarterly Mobile Phone Tracker, China's smartphone market shipped 71,6-million units in 1Q25, a 3,3% year-on-year (YoY) increase. This growth was driven by the government subsidies...

Beware of phishing attacks through SVG image files

Kaspersky has detected a new trend with attackers distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files – a format commonly used for storing images. Opening these files leads a user to phishing pages...

AMD hits TSMC N2 product silicon milestone

AMD’s next-generation AMD EPYC processor, codenamed “Venice”, has become the first HPC product in the industry to be taped out and brought up on the TSMC advanced 2nm (N2) process technology. This marks a major step forward in the execution of the AMD data centre CPU...

China’s tech self-reliance accelerates amid sanctions

Geopolitical tensions and domestic challenges are accelerating China's push toward technological self-sufficiency. As US sanctions intensify, China is doubling down on innovation across artificial intelligence (AI), semiconductors, robotics, and 5G. Strategic...

DDoS attacks show contrasting patterns across southern Africa

A new NetScout Threat Intelligence Report, for July to December 2024, reveals a complex and contrasting distributed denial of service (DDoS) attack landscape across southern Africa. According to the report, South Africa, Mauritius and Angola were among the most...

More News Today

Tech Wise Solutions partners with Sendmarc

Tech Wise Solutions has announced a partnership partner with Sendmarc, incorporating the Sendmarc offerings into its product stack from February 2023. Sendmarc provides email security solutions, with a platform that enables DMARC compliance across organizations of all...

Canon partners with Redington as Kenya distributor

Canon Central and North Africa (CCNA) has appointed Redington as its new authorised distributor in Kenya. "In our organisation, we place a high value on cultivating strong partnerships, and our collaboration with Redington, represents a significant milestone in our...

Red Hat, Arm collaborate on 5G and vRAN solutions

With the continued evolution of 5G, RAN and now virtualised RAN (vRAN), modern networks are increasingly relying on software-defined architecture and cloud-native technologies. This requires streamlining the deployment and management of applications across different...

Red Hat expands collaboration with Nvidia

Red Hat has announced a collaboration with Nvidia to deliver radio access network (RAN) deployments on industry-standard servers across hybrid and multicloud. From private datacenters to multiple public clouds to the network edge, the enterprise Kubernetes platform...

Use standardisation to meet SA tender requirements

Tenders are complex and competitive with multiple, highly-skilled organisations vying for the same projects and opportunities. This makes it key that companies stand out, showcasing their expertise and offerings in ways that underscore the invaluable tenets of...

Your data was stolen – now what?

How would you know if someone breached your organisation's systems and stole data? Ideally, you'd catch the culprits in the act or (less ideally) they contact you demanding payment. But you might only discover the theft when your stolen data surfaces publicly. Even...

Navigating the complexities of patient consent for health data

Even though healthcare is driven by data, it needs patient consent for providers to optimally leverage it across the myriad of disparate systems that currently exist. According to InterSystems South Africa, a creative data technology provider, if this consent is not...

Modern data management platforms for modern data management problems

Organisations today are faced with a highly challenging data environment. Data is growing at a rapid and unprecedented rate, housed in complex multi-cloud and hybrid environments, more business critical than ever before. By Kate Mollett, regional director of Commvault...

What AI means for digital security

As AI technology like ChatGPT evolves, so do the strategies and tactics used by cybercriminals. Steve Flynn, sales and marketing director at ESET Southern Africa, says ongoing awareness is crucial in understanding how to manage potential cybersecurity challenges posed...

Intelligent edge helps unlock real cloud value

To be competitive today, businesses need to be more agile, efficient, and proactive than ever, a feat that can only be successfully achieved using the enhanced intelligence that digital technologies can help to unlock. By Navinder Singh, GM of In2IT Technologies The...

Principal Technician at City of Cape Town

JOB OPPORTUNITY CORPORATE SERVICES - INFORMATION SYSTEMS AND TECHNOLOGY (IS&T)PRINCIPAL TECHNICIANBASIC SALARY: R588 221 TO R635 305 PER ANNUM - REF NO: CS 130/25 Requirements: A relevant three-year professional Tertiary ICT qualificationFive (5) to eight (8)...

Data Scientist

Seeking a Data Scientist to join the Process division, supporting enterprise data integration, advanced analytics, and predictive maintenance initiatives. Key Requirements Degree in Computer Science, Engineering, or related field2-3+ years in a data science...

Data Scientist – Gauteng Johannesburg Region

Seeking a Data Scientist to join the Process division, supporting enterprise data integration, advanced analytics, and predictive maintenance initiatives. Key Requirements Degree in Computer Science, Engineering, or related field2-3+ years in a data science...

IT Cybersecurity Engineer (DBN Hybrid)

ENVIRONMENT:A cutting-edge Tech company in Durban seeks the technical expertise of a highly skilled IT Cybersecurity Engineer to join its team. Your core role will be to enhance the security offering, ensuring proactive threat management, effective incident response,...

Scrum Master

My client based in Cape Town is currently looking for a Scrum Master to join them in on a permanent role. IT / Finance Responsibilities Apply Agile methodology values, principles, and practices to plan, manage, and deliver solutionsCoach and guide teams on effectively...

Senior Systems Developer

Exciting opportunity for a Senior Systems Developer to design, develop, and maintain software systems, including integration projects, that enhance business efficiency and service delivery. This role includes mentoring junior developers and ensuring adherence to...

IT Cybersecurity Engineer (DBN Hybrid) – KwaZulu-Natal Durban

ENVIRONMENT:A cutting-edge Tech company in Durban seeks the technical expertise of a highly skilled IT Cybersecurity Engineer to join its team. Your core role will be to enhance the security offering, ensuring proactive threat management, effective incident response,...

Scrum Master – Western Cape Kuils River NU

My client based in Cape Town is currently looking for a Scrum Master to join them in on a permanent role. IT / Finance Responsibilities Apply Agile methodology values, principles, and practices to plan, manage, and deliver solutionsCoach and guide teams on effectively...

View more career listings on our Careers Section