How to raise funds, then scale your African start-up

Kathy Gibson reports from Everything AI and Gitex Kenya in Nairobi – For many African start-ups, their biggest challenge is not coming up with solutions or creating systems that work – it is in scaling them effectively. Once the excitement of the initial idea and...

African startups look to new investors

Kathy Gibson reports from AI Everything and Gitex Kenya in Nairobi – Africa’s exciting and innovative start-ups are attracting interest from investors in the Middle East, Europe and Asia. Investors from these regions are arguably more aligned to the continent’s...

Pilot to production: the challenge of African developers

Kathy Gibson reports from the AI Everything Summit in Nairobi – Africa has no shortage of ideas, use cases and innovation when it comes to developing AI applications. But having a great idea, or an elegant algorithm, doesn’t necessarily translate into a bankable...

As economies shift, Africa urged to follow the money

Kathy Gibson reports from the AI Everything Summit in Nairobi – Africa is enjoying a renaissance as it embraces technology and artificial intelligence (AI) to drive its future growth. But there is a danger that the continent will remain a mere consumer of the...

WLAN market growth gains momentum

The enterprise worldwide wireless local area network (WLAN) market grew 13,2% in the second quarter of 2025 (2Q25) compared to 2Q24 to reach $2,6-billion and building on the market’s growth momentum from the previous quarter, according to IDC’s latest Worldwide...

iPhone launch ignites scam campaigns

As Apple opened preorders for the new iPhone, Kaspersky detected a spike in scam exploiting the device's launch hype, with fraudsters deploying fake websites, bogus lotteries, and phony “tester” recruitment schemes to harvest personal data and financial information....

FunkSec rises as an AI-powered ransomware threat

Check Point Software Technologies’ Global Threat Index for December 2024, emphasises the growing sophistication of cybercriminals. For Africa, December was hardly a season to be jolly with eight of the continent’s countries listed among the top 20 most attacked. ...

Banks warned about failed core strategies as time runs out

Banks around the world are rushing to upgrade legacy systems that are placing them at a significant disadvantage in a time when they are already challenged by neo banks that have none of the same infrastructural baggage. But as RFPs mount up, the C-suites have been...

Nvidia releases NIM microservices for Agentic AI

AI agents are poised to transform productivity for the world’s billion knowledge workers with “knowledge robots” that can accomplish a variety of tasks. To develop AI agents, enterprises need to address critical concerns like trust, safety, security and compliance....

ACSA partners to secure fuel supplies

Airports Company South Africa (ACSA) confirms that, following the fire at the National Petroleum Refiners of South Africa (NATREF) refinery on 4 January 2025, which is impacting the production of fuel nationally, the industry has secured enough supply for OR Tambo...

GenAI will make 2025 intriguing for collaboration platforms

While generative artificial intelligence (GenAI) significantly shaped team collaboration platforms in 2024, its influence will only continue in 2025. The year is set to be an intriguing one, marked by rising adoption of Agentic AI, transformation of contact center...

Starship blows up after successful booster catch

SpaceX’s Starship exploded during its ascent burn yesterday. According to SpaceX, posting on X: “Starship experienced a rapid unscheduled disassembly during its ascent burn. Teams will continue to review data from today's flight test to better understand root cause....

How to navigate cloud security challenges 

Cloud adoption lies at the heart of digital transformation, providing organizations with the agility and flexibility they need to stay competitive in today’s rapidly changing marketplace. Competing in a digital-first economy requires developing personalised customer...

More News Today

Unlock the potential of service management software

Software solutions for the service industry provide organisations with tools that deliver on their everyday needs. By Heman Kassan, chief commercial officer at Technodyn But more than that, growing customer expectations and increased competition mean businesses need...

Reimagining the IT infrastructure of the cloud operating model

Research by International Data Corporation (IDC) has revealed that 49% of CIOs across the Middle East, Turkey and Africa (MEA) believe that the cloud has the potential to play a significant role in driving innovation, creating new digital products, transforming...

Bring the omnichannel B2C experience into the B2B retail space

The pandemic caused a rapid acceleration of digital channels across all spaces, and the retail sector is no different. By Andrew Dawson, MD of MACmobile However, while most of the focus has been on the customer-facing side, there is a lot of benefit that could be...

Guiding principles for zero trust in banking and financial services

When it comes to adopting a zero trust approach, many organisations in the financial services sector already have most of the constituent parts required. By Hila Meller, BT vice-president security: Americas, EMEA and APAC In fact, we estimate organisations already...

Cryptocurrency scams are on the rise in SA

The digital gold rush is here. As more people attempt to make money from cryptocurrencies, criminals and con artists aren't far behind. Make sure you know how to recognise the biggest schemes that want to part you from your digital coins. By Carey van Vlaanderen, CEO...

The edge and AI: a partnership in smarter computing

The advent of artificial intelligence (AI) and its continued proliferation has seen the technology changing the functionality of computers by making it infinitely smarter and adept to meeting our daily requirements. By George Senzere, solutions architect: secure power...

Will solar PV increase the value of your home?

With rising electricity prices and Eskom loadshedding likely to be part of South African life for the near future, more households are looking to achieve more independence from the national power grid. As people evaluate their options, one of their most frequent...

Why it is critical to have a robust cyber security strategy

The need for a solid cyber security strategy is constantly discussed and debated. Yet the basic worm-type attacks first documented in 1972 are still with us today. This is because even the most basic measures to protect control systems from these types of attacks are...

Africa and the opportunity for digital natives, but

Africa holds huge economic potential - in almost every area - and the continent's youthful population structure represents tremendous opportunity within the modern digital era. But this calls for the continent to prioritise digitally enabled socioeconomic growth. By...

Pinnacle Finance launches in SA

ICT distributor Pinnacle has launched a Special Purpose Vehicle (SPV), Pinnacle Finance, aimed at assisting its ICT channel and clientele on opex financing deals and transactions. With Pinnacle Finance, resellers now have the opportunity to have access to assets that...

Technical Support Analyst at Parvana Recruitment

About our client:Our client, a listed global leader that provides innovative solutions, is committed to helping some of the world's most well-known brands tackle their most pressing business challenges. With a reputation as a trusted partner to global organisations,...

IT Risk Manager

IT Risk ManagerThe role of IT Risk Manager resides in the Governance, Risk and Business Engagement function of the company that is responsible for Governance and IT Risk Management within the company. The IT Risk Manager will be actively involved in defining,...

Security Engineer (Mid-Level)

Seeking a mid-level Security Engineer with 3-7 years of hands-on experience in cybersecurity operations. Key Requirements 3-7 years' experience in information security or a related roleProficient in cybersecurity frameworks (NIST, ISO 27001) and remote workforce...

Technical Support Analyst at Parvana Recruitment – Remote Remote

About our client:Our client, a listed global leader that provides innovative solutions, is committed to helping some of the world's most well-known brands tackle their most pressing business challenges. With a reputation as a trusted partner to global organisations,...

IT Risk Manager – Western Cape Cape Town

IT Risk ManagerThe role of IT Risk Manager resides in the Governance, Risk and Business Engagement function of the company that is responsible for Governance and IT Risk Management within the company. The IT Risk Manager will be actively involved in defining,...

Security Engineer (Mid-Level) – Gauteng Johannesburg Region

Seeking a mid-level Security Engineer with 3-7 years of hands-on experience in cybersecurity operations. Key Requirements 3-7 years' experience in information security or a related roleProficient in cybersecurity frameworks (NIST, ISO 27001) and remote workforce...

IT Project Manager

Overall Purpose of the JobPurpose StatementThis role, like all others in the group, must prioritise “making every guest a returning and referring guest”. Oversees the end-to-end planning, execution, and delivery of strategic IT projects and programmes across the...

IT Support Technician

Client based in Cape Town CBD is looking for a hands-on IT & Dialler Co-ordinator, who will take ownership of all local IT infrastructure, including network setup, technical support, and Active Directory management. The successful candidate will also support...

IT Project Manager – Remote Remote

Overall Purpose of the JobPurpose StatementThis role, like all others in the group, must prioritise “making every guest a returning and referring guest”. Oversees the end-to-end planning, execution, and delivery of strategic IT projects and programmes across the...

IT Support Technician – Western Cape Cape Town CBD

Client based in Cape Town CBD is looking for a hands-on IT & Dialler Co-ordinator, who will take ownership of all local IT infrastructure, including network setup, technical support, and Active Directory management. The successful candidate will also support...

View more career listings on our Careers Section