Information Regulator too lenient with POPIA transgressors
The most disruptive development yet?
Internet of things commerce will pave the way for new-generation technologies covering logistics, inventory and supply chain management.
InfoReg’s patience with POPIA violators is coming to an end
Despite SA’s data privacy law coming into force a year ago, the Information Regulator reveals it’s yet to fine any of the organisations that suffered a data breach.
Fourth industrial revolution resistance in manufacturing
Trade unions and worker councils in SA’s manufacturing sector fight 4IR tech deployments amid job loss fears.
Balancing risk vs reward in no-code, low-code
Despite the many benefits no-code, low-code and open source tools offer, there are downsides to these tools if they are not managed well.
Third-party cyber breaches give local CISOs sleepless nights
Leading chief information security officers share their escalating worries, as more South African organisations fall victim to cyber attacks.
Beware the bevy of black swans
At a time of unprecedented black swan events, a good data protection strategy remains absolutely priceless for all companies.
Take DataOps approach for quick digital transformation wins
Data is a pivotal part of any modernisation initiative, so it must be the first consideration when driving a digital transformation journey.
Key considerations when planning to migrate to the cloud, part two
An organisation must have a clearly-defined use case the cloud will satisfy, and a plan detailing the migration method and process that will be followed.
What next for small businesses in post-pandemic world?
Just as tech played a vital part in ensuring small businesses survived the pandemic, it can further propel them to success in the future.
Why business is moving to ‘pick ‘n mix' approach to software
Companies are now employing a broad variety of commercial, open source and low-code software where each makes the most sense.
Coping with life in the wild
The emerging anywhere/anytime working model requires a distinctly different security posture to ensure the organisation is resilient in the face of changing security threats.