Subscribe
0:40

Register for the ITWeb Security Summit Johannesburg

BCX is a sponsor for this year's event, which is taking place from 4-6 June.

4:10
SYSPRO17 Apr

SYSPRO unveils findings from its third annual Global CFO Survey

The survey sees manufacturing chief financial officers shifting their focus to operational resilience.

2:00
Commvault17 Apr

Commvault acquires Appranix

Commvault says the acquisition enables it to solve a critical cyber resilience challenge facing enterprises today – rapidly rebuilding cloud applications after an outage or attack.

3:40

Ster-Kinekor to lay off 236 employees

The affected departments include information technology, business operations, content, finance, head office, regional operations and cinemas.

2:40

SA’s trade regulator ITAC hit by cyber attack

The International Trade Administration Commission of SA becomes the latest government entity to fall victim to a cyber attack.

1:50
Ellies11 Apr

JSE-listed ICT firm Ellies goes belly up

Application will be made to the court for an order discontinuing the Ellies business rescue proceedings and placing the company into liquidation.

1:00

Endpoint security essentials for the C-suite

An executive's digital dilemma: With great tech comes greater risks.

5:00

New IT risk regulations for SA financial sector in 2024

Financial services companies, including insurers, have until 15 November to comply with the requirements of the new Joint Standard for IT Governance and Risk Management

3:00

Huawei Fusionsolar launches Luna 2.0 solar solution in SA

Given the country’s frequent power outages and unstable electricity supply, solar PV and energy storage systems have become increasingly vital.

4:50

Unstructured data and all-flash backup: The magic is in the recovery

A backup appliance using all-flash can achieve recovery times 50 times faster than traditional disk-based arrays, says Data Sciences Corporation.

4:10

Solid8 Technologies: Trusted partner in sub-Saharan Africa's cyber security landscape

Solid8 provides a curated selection of specialised solutions across the privacy spectrum, says Riana Burgess, channel partner executive at Solid8 Technologies.

4:00

Security intelligence needs AI, machine learning-powered data protection and risk response

As attackers use AI and ML to breach networks, it is critical for data protection solutions to also use these technologies to detect breaches and mitigate risks, says Lourens Sanders, senior sales engineer at Commvault.