Disgruntled ride-hailing drivers lobby govt on COVID-19 relief fund
Ride-hailing operators and drivers fear their vehicles will be repossessed if government doesn’t provide financial support during the lockdown.
IoT: Its moment has come
For years, there has been talk of the wonders of the Internet of Things (IoT). Enabling machines to send and receive data has long been touted as the next big thing, but although it has held a lot of promise, IoT never really seemed to get out of the starting blocks. This seems to be changing. As devices are becoming 'smarter' and cheaper, networks are being configured to handle large quantities of data.
IT, information security thinking needs to change
Legacy IT and information security thinking is no longer good enough, says iCrypto, which will be presenting at the ITWeb Security Summit 2018.
Infosec thinking within enterprise must change
The legacy way of managing access to enterprise apps and systems throughout the complex enterprise ecosystem is no longer good enough.
2018: The year of data regulation
GDPR is set to be enacted by the middle of the year, and while POPI's implementation date is not set, it will happen before December 2018, says Forcepoint.
GDPR or POPI?
Why should South African businesses care about a piece of data privacy legislation that's due to be passed next year in €EU countries?
Yahoo's 2016 Year in Review: Top Searched Celebrities, Most Popular News Stories, Leading Fashion Trends, and More
Yahoo (YHOO) today announced its annual 2016 Year in Review report. Entering its 15th year, Year in Review offers a detailed look into what intrigued the hearts and minds of millions of users worldwide throughout the year.
Get your head above water
Big corporations will soon have to come clean about breaches of their IT systems - and all hell will break loose.
Beware the Android app hazard
Enormous amounts of information are being shared with tracking and advertising agencies when users download certain Google Play Store apps.
Legality pain for security pros
There is a gap between the business and legal requirements of information security, says Performanta.
Security pros go head-to-head
The IT Security Challenge gives participants the opportunity to test how effective they are in combatting attacks.