AI-enabled attacks drive ransomware surge

Cybercrime no longer functions as a series of isolated campaigns. Today, it operates as a system, with malicious hackers operating across an end-to-end life cycle and compressing the attack life cycle with shadow agents. This is the headline finding from the 2026...

Employees are the biggest cyber threat – and it will only get worse

South Africa experienced a 46% increase in insider cyber risk in 2026, surpassing the global average of 44%. What’s more, 63% of South African companies surveyed expect insider‑driven data losses to increase as growing numbers of disgruntled employees are resorting to...

Interconnected systems at risk of a digital pandemic

Are we ready for solar storms, submarine cable cuts, satellite disruptions, and extreme weather to disrupt communication networks and potentially trigger a “digital pandemic"? A new report – “When digital systems fail: The hidden risks of our digital world​" –...

CEOs are reshaping C-suite roles for the AI era

The accelerating pace of artificial intelligence (AI) is pushing CEOs to redesign how C-suite roles are structured to drive greater business impact across the enterprise. In the foreword of a new global study from the IBM Institute for Business Value, IBM...

Geneva Consensus sets out trade roadmap

The 16th United Nations Conference on Trade and Development (UNCTAD16), held from 20 to 23 October in Geneva, Switzerland, concluded with the adoption of the Geneva Consensus and a political declaration. The conference took place against a complex global backdrop, as...

rAge hosts six cosplay competitions

Cosplay is taking centre stage at this year's rAge (really Awesome gaming expo), with six competitions hosted by GES. “At GES we stand by the moto Cosplay is for Everyone, and we want to reflect this in the diverse number of competitions this year allowing everyone to...

Secure enterprise browsers to the fore

By 2028, 25% of organisations will augment existing secure remote access and endpoint security tools by deploying at least one secure enterprise browser (SEB) technology to address specific gaps, according to Gartner. Threat actors frequently target employees with...

Second quarter of growth for hardcopy peripherals

In the fourth quarter of 2024, the global Hardcopy Peripherals (HCP) market experienced a 3,1% year-over-year (YoY) growth, with nearly 22-million units shipped. This marks the second consecutive quarter of positive YoY growth, as reported by the IDC Worldwide...

Power key to data centre growth

The global data centre power market size is anticipated to reach $42,35-billion by 2030, according to a new report by Grand View Research. The market is projected to grow at a CAGR of 13,2% from 2025 to 2030. The factor driving the market growth is the shift in focus...

Innovation in logistics opens up regional opportunities

As trade corridors expand and the demand for sustainable supply chain solutions grows, transformative trends in infrastructure, trade integration, and digital innovation are driving southern Africa’s logistics landscape. This is according to a Reload Logistics...

Freedom gaps threaten free press, speech, Internet

Amid global debates about press freedom, free speech and freedom on the Internet, a new Pew Research Centre report shows there is a disconnect between how people rate the importance of these freedoms and how free they actually feel to express themselves.  Generally,...

Compliance technology key to exit greylisting

South Africa's inclusion on the Financial Action Task Force's (FATF) grey list has been a major concern for the country's financial sector. However, with the latest update from the FATF, it seems the country is making significant progress in addressing its action...

MTN says critical infrastructure safe after security breach

MTN has experienced a cybersecurity incident that resulted in unauthorised access to personal information of some MTN customers in certain markets. The group has assured customers that its core network, billing systems and financial services infrastructure remain...

Consistent communication helps compliance leaders to manage risks

Third-party risk management (TPRM) is compromised in many organisations because those holding the relationship with the third-party (relationship owners) don’t escalate red flags to compliance teams reliably, according to Gartner. Relationship owners are most often...

More News Today

Red Hat expands collaboration with Nvidia

Red Hat has announced a collaboration with Nvidia to deliver radio access network (RAN) deployments on industry-standard servers across hybrid and multicloud. From private datacenters to multiple public clouds to the network edge, the enterprise Kubernetes platform...

Use standardisation to meet SA tender requirements

Tenders are complex and competitive with multiple, highly-skilled organisations vying for the same projects and opportunities. This makes it key that companies stand out, showcasing their expertise and offerings in ways that underscore the invaluable tenets of...

Your data was stolen – now what?

How would you know if someone breached your organisation's systems and stole data? Ideally, you'd catch the culprits in the act or (less ideally) they contact you demanding payment. But you might only discover the theft when your stolen data surfaces publicly. Even...

Navigating the complexities of patient consent for health data

Even though healthcare is driven by data, it needs patient consent for providers to optimally leverage it across the myriad of disparate systems that currently exist. According to InterSystems South Africa, a creative data technology provider, if this consent is not...

Modern data management platforms for modern data management problems

Organisations today are faced with a highly challenging data environment. Data is growing at a rapid and unprecedented rate, housed in complex multi-cloud and hybrid environments, more business critical than ever before. By Kate Mollett, regional director of Commvault...

What AI means for digital security

As AI technology like ChatGPT evolves, so do the strategies and tactics used by cybercriminals. Steve Flynn, sales and marketing director at ESET Southern Africa, says ongoing awareness is crucial in understanding how to manage potential cybersecurity challenges posed...

Intelligent edge helps unlock real cloud value

To be competitive today, businesses need to be more agile, efficient, and proactive than ever, a feat that can only be successfully achieved using the enhanced intelligence that digital technologies can help to unlock. By Navinder Singh, GM of In2IT Technologies The...

AI in HR: gimmick or godsend?

Companies need an internal committee as well as an industry body to ensure artificial intelligence (AI) is used responsibly for HR processes within their business and by their service providers. This is according to Carmen Arico, chartered reward specialist and...

Hybrid workplaces need a cloud-based print and scan solution

One of the main findings of Microsoft's 2022 Work Trend Index -- an annual study that outlines the top trends business leaders must pay attention to in the shift to hybrid work -- is that "every organisation in every industry will have to infuse technology into every...

How geospatial data is revolutionising banking

Change is constant in today's world. In the financial services and banking sector this presents unique challenges, such as increasing competition, ongoing regulatory compliance requirements, and rising customer expectations. By Charl Fouché, chief operations officer...

IT Technician (CPT) – Western Cape Cape Town

ENVIRONMENT:A Tourism and Hospitality company providing luxury accommodation seeks a highly skilled & solutions-oriented IT Technician with strategic vision to join its team. You will provide proactive supervisory mechanisms for ensuring seamless operations of IT...

Online Management Systems & Sales Administrator

About the RoleWe are seeking a highly organized and detail-oriented Online Management Systems & SalesAdministration Officer to support and manage purchasing, product loading, pricing accuracy,supplier coordination, and system integrity across our Cape Town and...

FIELD SERVICES TECHNICIAN – Kokstad

Provide onsite technical support across the CLIENTS suite of products, outsourced services, and customer solutions, to maintain CLIENTS products and optimize client service. Responsible to assist with hardware problems, removing and replacing faulty equipment,...

Senior F5 Network Engineer at Sabenza IT & Recruitment

We're looking for an experienced F5 Engineer to manage and optimize our F5 environment across South Africa and the wider African region. In this critical role, you'll ensure stability, security, and high availability while leading implementations, troubleshooting...

Senior Business Analyst (CH1161)

Our client, in the Financial Services industry, has an opening for a Senior Business Analyst to join their team. You will be in charge of gathering the company's business requirements within Product Portfolio, assessing the impact of those changes, capturing,...

FIELD SERVICES TECHNICIAN – Kokstad – KwaZulu-Natal Kokstad

Provide onsite technical support across the CLIENTS suite of products, outsourced services, and customer solutions, to maintain CLIENTS products and optimize client service. Responsible to assist with hardware problems, removing and replacing faulty equipment,...

Senior Business Analyst (CH1161) – Western Cape Kuils River

Our client, in the Financial Services industry, has an opening for a Senior Business Analyst to join their team. You will be in charge of gathering the company's business requirements within Product Portfolio, assessing the impact of those changes, capturing,...

Salesforce Solutions Architect

Design scalable, secure Salesforce architectures and solution roadmaps.Translate business requirements into technical designs.Oversee configuration, custom development (Apex, LWC, Visualforce), and integrations (APIs, Mulesoft).Manage data modeling, migration, and...

View more career listings on our Careers Section