Technology News
Protecting against CryptoLocker
Today, most businesses are run on computers. Owning a computer, accessing e-mails, surfing the Internet, interacting on social media sites and being connected to a network all carry the threat of attacks from malicious programmes and viruses, says Roberto Caprio, MD,...
Big data analytics boosts security
Fraud costs organisations is costing organisations across all industries millions of rands. As the amount and sophistication of schemes to defraud businesses increases, many companies are turning to big data analytics to comb through vast volumes of data to reveal...
Always-on SSL ensures Web site security
Web sites have been using SSL technology for years to ensure their security, and the certificates and their uses are well understood. SSL that only protects users at login, however, leaves them vulnerable when they’re spending time on your Web site. Says LAWtrust...
Industry experts comment on Budget Speech
The 2014 National Budget Address echoed a resounding endorsement of the National Development Plan (NDP), viewed by business as a blueprint for faster growth, job creation and poverty alleviation. What’s more, Minister Pravin Gordhan highlighted the private sector as a...
How to better manage contract management
Contracts are an important instrument of business, yet they remain one of the worst managed components within an organisation, often leading to the mismanagement of operational processes that in turn impact efficiencies and put a company at risk. The bottom line is...
Ghana granted Rockefeller Foundation loan
The Rockefeller Foundation has announced a $3,8-million grant to the Ghanaian government in partnership with the World Bank to support the establishment of world class facilities that will attract IT and IT enabled firms, including Business Process Outsourcing (BPO)...
Samsung achieves security certification
Samsung Electronics South Africa has announced that it has reached a new milestone for its enterprise customers by becoming the first in the mobile industry to achieve a Common Criteria Certification on its Galaxy devices embedded with security platform Knox. Common...
Global demand for Linux skills grows
Professionals with experience in open source operating systems are in high demand, according to the annual Jobs Report by the Linux Foundation. The report shows that enterprises around the world are increasingly dependent on Linux in all corners of their business and...
SKA boost as first MeerKAT antenna raised
The first of 64 antennae that will make up the MeerKAT radio telescope, the country's precursor to the Square Kilometre Array (SKA), was launched at the SKA South Africa site outside Carnarvon in the Northern Cape yesterday. The MeerKAT Karoo Array Processor Building,...
Facebook looks to the skies for connectivity
Facebook has announced a plan which could use aeroplanes and satellites to provide Internet connectivity. The company’s new Connectivity Lab boasts a team that is working on new aerospace and communication technologies to advance the Internet.org mission of improving...
Torque IT offers training for the disabled
Leading ICT training solutions provider, Torque IT a wholly owned subsidiary of the JSE-listed Kelly Group, has stepped up and offered IT training to people with disabilities. “We have found that there is a need to provide inclusive learning opportunities for students...
Gemalto offers immigration control solution
Gemalto has introduced the Coesys Border and Visa Management solution, to meet the combined needs of securing borders and simplifying travel procedures. The end-to-end solution integrates high-availability service platforms, secure software and on-site services to...
Retain a competitive edge with technology
Organisations not embracing today's world of connectedness with social, collaborative and employee-driven learning, risk being left behind by competitors. "Although it's still early days, collaborative working environments are fast becoming a trend in the South...
Protecting against CryptoLocker
Today, most businesses are run on computers. Owning a computer, accessing e-mails, surfing the Internet, interacting on social media sites and being connected to a network all carry the threat of attacks from malicious programmes and viruses, says Roberto Caprio, MD,...
Big data analytics boosts security
Fraud costs organisations is costing organisations across all industries millions of rands. As the amount and sophistication of schemes to defraud businesses increases, many companies are turning to big data analytics to comb through vast volumes of data to reveal...
Always-on SSL ensures Web site security
Web sites have been using SSL technology for years to ensure their security, and the certificates and their uses are well understood. SSL that only protects users at login, however, leaves them vulnerable when they’re spending time on your Web site. Says LAWtrust...
Industry experts comment on Budget Speech
The 2014 National Budget Address echoed a resounding endorsement of the National Development Plan (NDP), viewed by business as a blueprint for faster growth, job creation and poverty alleviation. What’s more, Minister Pravin Gordhan highlighted the private sector as a...
How to better manage contract management
Contracts are an important instrument of business, yet they remain one of the worst managed components within an organisation, often leading to the mismanagement of operational processes that in turn impact efficiencies and put a company at risk. The bottom line is...
Ghana granted Rockefeller Foundation loan
The Rockefeller Foundation has announced a $3,8-million grant to the Ghanaian government in partnership with the World Bank to support the establishment of world class facilities that will attract IT and IT enabled firms, including Business Process Outsourcing (BPO)...
Samsung achieves security certification
Samsung Electronics South Africa has announced that it has reached a new milestone for its enterprise customers by becoming the first in the mobile industry to achieve a Common Criteria Certification on its Galaxy devices embedded with security platform Knox. Common...
