Subscribe
4:40

No trust within the network?

Strict identity verification and continuous authorisation are required for all users and devices at all times, broadening the security perimeter and boosting trust.

4:30
IDC9 May

‘Complacent’ security investment rings alarm bells

Planned investment in security slumps, due to complacency that needs to be addressed quite sharply, says IDC.

3:10
Nutanix9 May

Nutanix emerges as resilient alternative to disruptive vendors

Nutanix offers a hyper-converged infrastructure platform, consolidating compute, storage and networking into a single, integrated solution, says Helen Kruger, CEO of Troye.

3:00

Strategix Technology Solutions achieves PCI DSS compliance

Companies that have their PCI DSS AOC keep pace with the rate of regulatory change while fortifying themselves against the equally rapid changes occurring in the cyber crime landscape.

1:40

GenAI central to Oracle’s cloud app strategy

Vendor targets enterprise space with GenAI-centric Fusion stack.

5:20
CASA8 May

Embarking on a Zero Trust journey

If feeling overwhelmed at the scope of the Zero Trust architecture, get the basics out of the way first. Here’s how.

5:00

Big business benefits in moving to cloud finance, accounting systems

While core functionality will be similar, modern cloud financial software focuses on automation, ease of use, data visibility and integration of disparate solutions and functions, says Garrith Hyman, team leader for Sage Intacct at Brilliant Link.

4:00
Inq8 May

Taking your customer experience to new heights

Understanding the customer’s perspective and showing empathy can significantly enrich CX for the business, says Tshidi Machaba, Group Head of Sales at inq.

2:20

IBM expands software portfolio to AWS Marketplace in SA

The computing giant extends its software availability to 92 countries in the AWS Marketplace.

1:40
Nutanix7 May

Nutanix wins at Intelligent ICT Awards Africa 2024

The company received the Intelligent Data Centres Storage Partner Award.

3:20

2024 CrowdStrike Global Threat Report: From breakout to breach in under three minutes

The report indicates adversaries seek to disrupt global elections and exploit generative AI technology.

1:30
AWS3 May

AWS acknowledges black-owned SME partners

AWS’ EEIP is an acceleration programme designed for South African black-owned SMEs.