Black Friday sales have become extremely popular in South Africa, so much so that many retailers have extended their sales to last the entire month. It is now a retail extravaganza known as Black November, where both retailers and consumers get to enjoy some serious bargains. Last year, South African...
To prepare for the busiest online shopping season of the year, it is important to understand how your data is being used on popular apps. According to the research by the Atlas VPN team, eBay and Amazon Shopping collect the most user data out of the analyzed Android apps. eBay...
Guardian of the connected world, NETSCOUT has made use of its extensive internet visibility to closely scrutinise the disruptive endeavours of Anonymous Sudan, a prolific threat actor engaged in recent widespread distributed denial-of-service (DDoS) attacks, in order to better understand its methodologies and impacts. Targeting Africa and beyond, this group aligns...
The accessibility of generative AI tools has lowered the barriers for would-be criminals, while the transition to hybrid work models and geographically dispersed teams has expanded the attack surfaces they can exploit. In this context, the overlap of AI technology and the interests of financial leaders becomes increasingly significant. Numerous financially...
In today’s increasingly interconnected and data-driven world, where technology infiltrates every facet of our lives, the public sector sits at the forefront of critical services and the safeguarding of national security. Although digital innovations and technologies have modernized and advanced government institutions, they have simultaneously made them potential prime targets...
In an increasingly digital world, security is paramount. This is especially true when it comes to onboarding partners for platforms like GoodApp, where trust and reliability are vital. GoodApp understands the importance of protecting both its users and partners, which is why it has implemented robust security measures to ensure...
Eaton has unveiled its latest innovation, the Gigabit Network Card (Network-M3), combining enhanced features with innovative cybersecurity elements. The Network-M3 card offers web-based monitoring and alerts, transforming IT power system oversight in response to evolving security needs. "Cybersecurity challenges and threats keep on growing for all connected devices. Eaton is fully...
The Beatles were revived once again through the release of a new song, produced by AI. Artificial intelligence was able to recreate an old song, by combining parts of an old recording while also improving its audio quality. While this sounds exciting and opens up opportunities in the creation of...
In the interconnected world of today’s digital landscape, the internet has woven itself into the everyday fabric of our lives. The web provides the world’s knowledge at our fingertips, connects us with friends across continents, and presents a thriving platform for creativity and expression. The digital world can also reinforce...
Commvault, a  provider of cyber resilience and data protection solutions for hybrid cloud organizations unveils Commvault Cloud, powered by Metallic AI. This unique platform aims to revolutionize how IT and security teams enhance cyber resilience amid non-stop cyber threats. Commvault Cloud consolidates all SaaS and software offerings on one platform,...
According to a recent report, more than 30 AI communities in Africa offer various services in the field. Tunisian AI start-up InstaDeep received $100 million in funding early last year, with the market across the continent projected to grow by 20% annually from 2022 to 2029. But even though...
Commvault has unveiled robust backup and recovery solutions for enterprise organizations, powered by Lenovo technology. Paired with Lenovo's award-winning hardware systems, Commvault offers IT teams data protection and management from a single view, delivering simplicity. CIOs gain flexibility, reliability, and high-scale performance with better TCO and faster time to value. Kate...
Soon, South African's could have the option of placing their retirement fund contributions in two ‘pots’ – the one being the retirement pot and the other being a savings pot that can be accessed by members while still in employment. BDO recently referred to this as three pots, in...
CMC Networks, a global Tier 1 service provider, has been selected by SafetySA, a leading provider of Testing, Inspection, Certification (TIC) and Training solutions, to upgrade its network and thereby improve service delivery to its customer base. The migration from MPLS to a software-defined wide-area network (SD-WAN) enables...
In an era where digital security forms the backbone of global financial systems, blockchain technology has been hailed as a revolutionary leap in ensuring decentralized and tamper-proof transactions. However, the rapid advancements in quantum computing are casting long shadows on the current cryptography methods underpinning blockchain security. This emerging scenario...
Kaspersky researchers have discovered a persistent campaign compromising a specific type of secure USB drive, used to provide encryption for safe data storage. Dubbed 'TetrisPhantom,' this espionage effort targets government entities in the Asia-Pacific region (APAC) and shows no discernible overlap with any known threat actor. These and other...
22,877FollowersFollow

Recent Posts