The Financial Intelligence Centre warns that the country’s crypto sector carries a high inherent risk for the growing ...
The AWS Well-Architected Framework is built around six key pillars that assess how well a company's architecture aligns with ...
The data privacy law enforcer launches an online portal for reporting data breaches, moving away from e-mailed reports.
Vachiat began his career at Konica Minolta South Africa in 2002 as a software engineer and most recently, he served as GM for ...
Data sovereignty is a strategic imperative that will determine Africa’s ability to shape its digital future, says Tunde ...
The sector is considered fair game by cyber criminals who continue to attack SA’s already stretched healthcare capability.
This paper explores the updated NIST CSF Framework and discusses places where Veeam Software can assist with implementing ...
As part of its Paratus Social Investment programme, the company provides connectivity, digital resources and educational ...
Mecer Inter-Ed offers free webinars designed to help users harness the full potential of Microsoft 365 Copilot.
The company received the Partner to Partner Excellence of the Year Award by the International Association of Microsoft ...
Vishing uses voice calls or voicemails to create a sense of urgency and pressure you into acting quickly, says John Mc ...
With the rise of automated attack tools, low-cost phishing kits and 'spray and pray' tactics, SMEs have become prime targets ...