BUSINESS TECHNOLOGY MEDIA COMPANY
Companies
Sectors
Business Continuity Management
1:30

ContinuitySA offers new ISO 27001 Lead Implementer training in Johannesburg

The five-day course will run at ContinuitySA's Waterfall campus, in Midrand, from 2-6 March and 3-7 August.

2:50
Wednesday

SA’s connectivity fully restored after subsea cable fix

South Africans can now breathe a sigh of relief as international connectivity capacity returns to normal, says Openserve.

4:50
Wednesday

Adapt or die – keep your brand relevant

Clearly defining your new or rebranded value proposition from the outset is important, so that you get the messaging right and connect with customers, says Helesha Moodley, Marketing Lead at Ovations.

2:50

Maredi Technologies' 10-year rise to operational excellence

Having implemented scalable changes and focused on its employees, customers and products, the company now aims to become SA's ICT partner of choice.

2:30
13 Feb

1.7m Nedbank clients exposed after service provider hack

The bank investigates a data security issue that occurred at the premises of a third-party service provider, Computer Facilities.

2:30

Data protection must be boardroom priority

Companies must get serious about data protection in the software-as-a-service era, says Redstor’s Danie Marais.

2:50

Is your company prepared for the coronavirus?

Companies should consider the direct and indirect impacts of the pandemic when evaluating whether they are prepared for the coronavirus, says Padma Naidoo, GM: Advisory Services at ContinuitySA.

3:30

Tracker hack hints at more ransomware attacks in SA

Security specialists believe 2020 will see more cyber attacks in SA, after the stolen vehicle recovery company was hacked on Sunday.

2:30

Tellumat offloads telecoms lines of business

The company exits the telecommunication industry following the sale of several lines of business to CK Solutions.

5:00

Four good reasons to upgrade your software

Why upgrading your software makes excellent business sense in today’s “app economy”.

4:20

Is your business too ‘trusting’?

Businesses must assume that no user or device can be trusted and must always be verified when accessing the network, says Lukas van der Merwe, specialist sales executive: Security at T-Systems South Africa.

0:50

White paper: Modernising data architectures for a digital age using data virtualisation

Organisations have started data architecture modernisation projects in recognition of the need for them to become more data-driven to effectively participate in the emerging digital economy.