Read time 1:40

Endpoints the new frontier in security battle

Over half of successful cyber attacks are on endpoints, says Jeremy Matthews, Panda Security Africa.

Google pledges $6m to start-ups in Africa


The tech giant hosts a competition for African tech-based NGOs to apply for up to $6 million in funding through the Google Impact Challenge.

Home appliances present new risks

Technology is changing so rapidly that security risks are being left behind in some areas.

It's your job to secure anything that uses electricity

Soon, we won't even know that our devices are talking to the manufacturers, says Mikko Hypponen.

Netflix, Cell C's Black turn up the heat on MultiChoice


While the video-on-demand service is open to regulation in SA, Cell C's Black says the hype around Netflix is exaggerated.

We are making users scapegoats for our failings

You can patch humans: it's called education, says SphereNY's Jason Street.

Altron unit heads to court over Tshwane broadband


Altech Radio Holdings and the City of Tshwane will meet in court today to argue over the city's multibillion-rand broadband project.

Profile hackers to stop them in their tracks

There are five kinds of hackers, says Mikko Hypponen, keynote speaker at ITWeb Security Summit 2018.

CISOs not investing in insider threat defences


There's a disconnect between what they perceive as their greatest threat and the solutions they invest in, found a survey.

Rugby player creates home improvement app


HomeFixer collects the details of home improvement tradesmen into one app to make it easier for renovators to find reliable service providers.

YouTube Music aims to better appeal to local tastes


The Google unit hires music experts across the world to make its revamped music streaming subscription more locally "authentic".

The benefits of 25GbE

By migrating to 25/100 Gigabit Ethernet, companies will get better performance, along with the best data centre return on investment, says Mellanox.

Security Summit 2018: How to implement DevSecOps

RMB's Jason Suttie will cover the steps to implementing DevSecOps