Trellix detects collaboration by cyber criminals, nation-states
The report highlights new programming languages in malware development, the adoption of malicious GenAI and the acceleration of geopolitical threat activity.
IBM debuts utility-scale quantum processors
The firm unveils IBM Quantum Heron, which it says is the first in a new series of utility-scale quantum processors.
CodeJIKA initiative targets 100K African youth
Code for Change to host online coding activities across the continent during Computer Science Education Week.
Digital trust: Why SEO poisoning is on the rise
Our automatic tendency to trust what we see on our screens, says Paolo Passeri, principal sales engineer at Netskope.
Mac: built to support a transforming financial services sector
Mac devices meet the key requirements for devices in use by modern financial services organisations, says iStore Business.
eBook: Redefine agriculture
Smart farms are the future, and the foundation of smart agri is connectivity...
White paper: The internet changed everything… with AI: everything must change
We have reached a critical mass in global connectivity, with over 5 billion people connected to an internet of clouds.
Faranani DocTec: Empowering youth in ICT
The company's internships provide hands-on work experience, while the learnerships offer structured, long-term training.
NAVIC's strategic leap: Addressing more than just the SA security industry
NAVIC was assisted by Vodacom in adopting an AWS solution for its near real-time storage needs, particularly Amazon S3.
NEC recognised as Cisco's Mass Scale Infrastructure Partner of the Year for EMEA region
Projects that accelerated the deployment of innovative IP metro/access transport and edge cloud computing solutions globally assisted in securing the accolade, the companies say.
Five threat predictions to note for 2024
AI and machine learning will be used in future cyber security attacks to generate realistic phishing e-mails and websites.
White paper: How to stop business e-mail compromise threats
Advanced techniques for fighting financial phishing fraud.