Xperien achieves highest certification level
With 2,5-quintillion bytes of data being generated daily, securely sanitising assets and data that's no longer needed is more important than ever. Xperien has become the first IT asset disposal (ITAD) company in South Africa to achieve the globally-recognised Blancco...
Next-gen dashcams reduce fraudulent claims
Next-gen dashcams reduce fraudulent claimsThe insurance industry is built to provide cover for drivers and businesses to insure against the loss, damage or liability that occurs as a result of a vehicle accidents, theft, hijacking or fire. By Laurence Smith, executive...
Saicom Voice Services adds data management
Saicom Voice Services has added a data management solution to its evolving product stack, driven it says, by customer demand for services that are customisable to local business requirements and realities. "Our clients have come to rely on us for customisable...
Resistance to change the biggest reason for failure
People are resistant to change and this is the main reason why cloud migrations tend to fail. Business leaders must ensure their cloud strategy is aligned with their business goals, a lack of vision from management and staff will have an enormous effect on the success...
Lessons on the future of grid security
Cybercrime is evolving - as are its targets. While information theft remains the most expensive and fastest-rising consequence of cybercrime, core systems, such as industrial control systems are also being targeted - with increasing frequency. By Wandile Mcanyana,...
Cyber risk the Achilles heel for SMEs
Many small and medium businesses assume that they are not likely targets for a cyberattack, believing that only large corporates, banks and government institutions appeal to cyber criminals. As a result, their security measures are typically nowhere near the levels...
Governing the digital nomads of the future
The Fourth Industrial Revolution brings with it a fundamental shift in how we do business, writes Jessica Knight, IRMSA risk intelligence committee member. Advances in technology and the increasing digitisation of many roles means that the conventional...
Fujitsu develops AI disaster mitigation technology
Fujitsu Limited and Fujitsu Laboratories today announced the development of a technology that draws on mathematical models built with limited data on rainfall and water levels to create flooding predictions for rivers. The solution leverages Fujitsu Human Centric AI...
A risk-based approach to procurement
The impact of fraud in procurement can be far reaching with many aspects of the business affected by such transactions. With the threat of reputational damage, legal non-compliance and potential financial losses remaining a possibility, it is critical that...
Data allowed to go dark is a risk and missed opportunity
Increased data growth, coupled with the need to benefit from the existing data opportunity consistently positions data at the core of all business operations today. But within the data hype, are businesses too consumed with either storing all data for 'just in case'...
Are you prepared for multinational risks?
In recent years, many more organisations have established business continuity management programmes (BCPs) which define the different processes (suggestion to utilise the wording of 'process' rather than 'system' due to general, but not always, confusion around BCP...
Everyone should think like a hacker
Relevant cybersecurity isn't perpetuated exclusively through investment and systems, it is reliant on people and their understanding of the cyber threat. A leading ethical technology hacker in Europe, Jamie Woodruff, gained access to a well-known financial institution...