Virtualisation-specific security optimises the shared resource environment that virtual desktops offer.
Getting qualified answers from a vast, unstructured data lake demands a blended data approach to analytics.
Cloud encryption endeavours to make a company's data unreadable to anyone but the company itself.
Open source is used more than ever - but isn't open source security an oxymoron?
A new way for businesses and consumers to chat transforms the customer experience.
Mobile security threats are increasingly sophisticated and particularly dangerous as shoppers head online over the festive season.
Companies must ensure the software or app developed does what it was designed to do.
Networking as a service is not yet being provided in SA because of the requirement for long-term connectivity contracts.
The move to agile methodology, DevOps adoption and API proliferation is forcing a disruption in the testing market.
Security breaches usually happen under the radar, and may go undetected indefinitely.
The rapid pace at which technology is advancing has resulted in a product development runaway train.
What can a business do to ensure agile adoption runs smoothly?