IT can and should be used as a competitive tool and business differentiator.
The SA cyber crime report says criminals are after logon credentials, credit card details and personally identifiable information.
The abundance of applications in the market has important ramifications for the network.
Changes to the Labour Relations Act require equal pay for work of equal value.
There is a strong focus on client retention rather than acquisition in SA, where mobile penetration is over 100%.
The time to search for 2013 performance leaders is now.
The failure of identity control means cyber crime will continue to flourish.
The contact centre agent is dead... long live the service specialist.
Managing automation is key to ensuring a consolidated communication system delivers maximum benefit.
What goes wrong when a proprietary company buys an open source one?
A guide compiled by the Information Security Group of Africa aims to cast light on the perplexing topic of privacy.
The opt-in principle in the Protection of Personal Information Bill is not as strong as it needs to be.