SA has world’s highest cyberattack rate, identity visibility gap

South African companies have significant gaps in workforce password security, underscoring growing risks as they contend with rising cyber threats, increasing regulatory pressure, and limited visibility into user identities and access. This is according to a new study...

AI-enabled attacks drive ransomware surge

Cybercrime no longer functions as a series of isolated campaigns. Today, it operates as a system, with malicious hackers operating across an end-to-end life cycle and compressing the attack life cycle with shadow agents. This is the headline finding from the 2026...

Employees are the biggest cyber threat – and it will only get worse

South Africa experienced a 46% increase in insider cyber risk in 2026, surpassing the global average of 44%. What’s more, 63% of South African companies surveyed expect insider‑driven data losses to increase as growing numbers of disgruntled employees are resorting to...

Interconnected systems at risk of a digital pandemic

Are we ready for solar storms, submarine cable cuts, satellite disruptions, and extreme weather to disrupt communication networks and potentially trigger a “digital pandemic"? A new report – “When digital systems fail: The hidden risks of our digital world​" –...

Your next smartphone could be powered by a recycled toaster

For the past 20 years, the consumer electronics playbook has been simple: make it smaller, make it faster, and seal it shut. Manufacturers utilised industrial adhesives, proprietary screws, and integrated designs to create sleek devices that were virtually impossible...

EC wants Google to share search engine data

The European Commission has sent preliminary findings to Google outlining proposed measures to comply with the Digital Markets Act (DMA). Under these proposed measures, Google should allow third party search engines to access search data, such as ranking, query, click...

How to store and keep your sensitive data safe

Ahead of World Backup Day, Kaspersky research has revealed the most popular ways to store important data – 87% of South Africans prefer digital – and offers some tips on how to keep it safe. Global research shows that zoomers and millennials keep nearly everything...

SA young scientists excel in Tunisia and China

South Africa’s young scientists have once again demonstrated excellence on the global stage, achieving outstanding results at the International Festival of Engineering Science and Technology in Tunisia (IFEST²) and the Beijing Youth Science Creation Competition...

WAPA marks 20 years of wireless advocacy

The Wireless Access Providers’ Association (WAPA) celebrates its 20th anniversary this year, and kicked off the festivities in March at its annual Gauteng industry event. Themed “WAPA 20: Redefining the Wireless Landscape – Without Limits Since 2006,” the event, held...

What SA needs to do to ensure universal, meaningful connectivity

Kathy Gibson reports – Digital investment is not an end in itself: it is the foundation for a more inclusive, more resilient South Africa. This is the word from Boitumelo Mosako, CEO of Development Bank of South Africa (DBSA), introducing a Digital Infrastructure...

Online scams evolving faster than ever

NordVPN’s Threat Intelligence research unit - in collaboration with TechRadar - has revealed three major, interconnected global cybercrime operations exploiting user trust in digital platforms, outdated technology, and cryptocurrency markets. “Online scams are...

Starlink momentum shows no signs of abating

Namibia and South Africa might have rejected Starlink, but according to global analysts Opensignal, it is currently riding a wave of unprecedented momentum and has now evolved from a last-resort connectivity option into a mainstream broadband competitor. Its...

Diesel surges as record April price hike expected

South Africa's fuel retailers recorded the largest spike in diesel stop volumes in recent years in the week of 18 to 21 March, two full weeks before April's expected record price adjustment, according to Lightstone’s analysis of anonymised Tracker mobility data....

More News Today

Acer expands connectivity product lineup

Acer has expanded its connectivity product lineup with four new networking devices that bring next-generation WiFi 7 and 5G performance to more usage scenarios. The new lineup includes the Predator Connect X7S 5G CPE, the Acer Connect Ovia T360 Wi-Fi 7 Dual-Band Mesh...

Context-specific strategies help to retain talent

Over the past decade, retention strategies have evolved from transactional incentives to integrated, people centred approaches. This shift reflects a growing recognition that employee commitment is shaped not only by pay but also by purpose, development, and...

Vertiv debuts modular liquid cooling infrastructure solution

Vertiv has announced new configurations of the Vertiv MegaMod HDX, a prefabricated power and liquid cooling infrastructure solution engineered for high-density computing environments, including artificial intelligence (AI) and high-performance computing (HPC)...

Axis Communications signs CISA Secure by Design pledge

Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling its commitment to upholding and transparently communicating the cybersecurity posture of its products. A voluntary pledge...

Sage Copilot launches in Sage Operations

Sage has updated Sage Copilot to Sage Operations, which was formerly named “Sage Distribution and Manufacturing Operations”. The update gives manufacturing and distribution teams a clearer and more proactive way to manage daily operations, helping them spot issues...

Kaspersky enables independent transparency, accountability assessment

Kaspersky has released Protection beyond detection: Why trust and transparency decide your cybersecurity future, a new whitepaper based on an independent transparency and accountability assessment of 14 leading cybersecurity vendors. Kaspersky emerged as one of the...

Cisco debuts integrated AI security and safety framework

AI is no longer an experimental capability or a back-office automation tool: it is becoming a core operational layer inside modern enterprises. The pace of adoption is breathtaking. By Amy Chang, AI threat research and security team lead at Cisco Yet, according to...

Acer unveils Predator and Nitro gaming laptops

Acer has introduced its newest lineup of versatile gaming laptops powered by the latest Intel Core Ultra Series 3 processors, paired with Nvidia GeForce RTX 50 Series Laptop GPUs. The lineup features the Predator Helios Neo 16S AI, Acer Nitro V 16 AI, and Acer Nitro V...

Excuse me while I slip on past your security

Attackers are bypassing the very tools designed to prevent them from gaining access to the business, writes Richard Frost, head of technology solutions and consulting at Armata Cyber Security. AI-powered phishing has become the most virulent security threat to the...

How NHI could impact AML compliance

Taxation issues are a familiar case for South Africans. Every taxpayer will always begrudge rises, as the phrase “only certainties in life being death and taxes” will attest, but recently proposed increases feel particularly unwanted. By Bradley Elliott, CEO of...

Intermediate .NET Developer – Cape Town (Contract)

ENVIRONMENT:A client based in Cape Town is seeking Intermediate .NET Developers to join their growing development team. You will be responsible for building, enhancing, and maintaining business-critical applications, working closely with cross-functional teams to...

Senior Power BI Developer (Contract) – CPT

ENVIRONMENT:An organisation focused on enhancing service delivery excellence through information and communication technologies is looking for a Senior Power BI Developer to design, develop, and deliver advanced reporting and data visualisation solutions. You will...

BUSINESS ANALYST

Job purpose: To ensure the vision and strategy of the company by documenting, developing, and implementing innovative business processes and models. This role identifies process improvement opportunities to enhance the functioning of the company in alignment with its...

BUSINESS ANALYST – Gauteng Centurion

Job purpose: To ensure the vision and strategy of the company by documenting, developing, and implementing innovative business processes and models. This role identifies process improvement opportunities to enhance the functioning of the company in alignment with its...

IT Project Administrator (Contract) – CPT

ENVIRONMENT:Our client is seeking a detail-oriented IT Project Administrator to support project teams with coordination, documentation, and reporting. This role plays a key part in ensuring smooth project execution and effective communication across...

Senior Network Administrator

To support, secure, and maintain the organisation's network and server infrastructure, ensuring stable, secure, and reliable IT operations across the business.Minimum Qualifications and Requirements: Minimum 5 years experience in IT and Network AdministrationDiploma...

View more career listings on our Careers Section