2026’s defining telecoms trends
Juniper Research has revealed its Top 10 telecoms and connectivity trends for 2026 in a new whitepaper that evaluates the forces redefining telecoms - from AI-driven automation to new connectivity models - and pinpoints where operators, vendors, and investors must act...
Building trust, accelerating growth: securing Africa’s GenAI future
Generative AI has become the new frontier of workplace productivity, efficiently rewriting emails, analysing data, recording meetings, and automating complex tasks. This powerful technology is being adopted rapidly across the continent. By Linda Saunders, country...
Gartner Hype Cycle reveals how AI could transform sales
In response to evolving buyer behaviors and shifting purchasing trends, chief sales officers (CSOs) are transforming traditional sales practices by embracing innovative approaches, according to Gartner. Gartner’s Hype Cycle for Sales Transformation, 2025 highlights...
Securing AI agents through smarter ID management
The conversation about artificial intelligence in South Africa has shifted rapidly over the past year. By Boland Lithebe, security lead for Accenture, Africa What was once the stuff of conferences and pilot projects is now quietly embedding itself in boardrooms and...
Smart cities must be human cities: Why data needs a heartbeat
Urban October sent a clear message to governments to build people-centred smart cities where technology, data, analytics and artificial intelligence (AI) are leveraged to improve daily life and help communities recover from shocks. This global day highlights...
Mobile and digital IDs defining the future of travel
The International Air Transport Association (IATA) has released the results of its 2025 Global Passenger Survey (GPS), highlighting two key trends that are redefining the passenger travel experience: mobile reliance is rising; and biometric adoption is accelerating....
Smart solutions at the edge will transform SME operations
Artificial intelligence (AI), the Internet of Things (IoT) and edge computing are converging on many of the devices you will commonly find on a small business’s premises, such as point-of-sale systems, security cameras and even delivery vehicles. By Christo Wessels,...
Why attack surface management must look both inside and out
Attack surface management (ASM) has grown exponentially in recent years, evolving into a recognised market category that equips businesses with the strategies and visibility needed to protect their digital assets. By Kyle Pillay, security as a service manager at...
DLL hijacking has doubled since 2023
Security specialist Kaspersky reports that dynamic link library (DLL) hijacking attacks have doubled in the past two years. DLL hijacking is a common technique in which attackers replace a library loaded by a legitimate process with a malicious one. It is used by...
Cybercriminals exploit our best intentions
Cybercriminals are not only using fear and urgency to exploit their victims. Positive emotions – such as empathy, curiosity, and a desire to help – are also being exploited. This is the warning from Anna Collard, senior vice-president: content strategy and CISO...
Multi-cloud AI security: finding order in the chaos
Artificial intelligence (AI) is transforming how organisations innovate, serve customers, and operate at scale. By Avinash Gupta, head of Centre of Excellence at In2IT Technologies But when these workloads stretch across multiple cloud providers, complexity rises...
How to enable sustainable tourism
Africa’s Eden Tourism Association (Africa’s Eden), in partnership with JLL and the World Travel & Tourism Council (WTTC), unveiled a strategic roadmap to accelerate sustainable tourism growth across four countries in southern Africa. The findings are based on...