Why we should let our walls down when it comes to cybersecurity

Why we should let our walls down when it comes to cybersecurity

With digital threats growing more rampant across the country and from around the world, the idea of building 'walls' for cyber defence and protection can seem appealing. But even in this age of hackers relentlessly penetrating our networks, in the information technology security industry, we know that walls don’t work.…

Read More
Veritas 360 Data Management Suite with new subscription pricing

Veritas 360 Data Management Suite with new subscription pricing

Veritas has unveiled the Veritas 360 Data Management Suite, a new offering that packages our data management technology portfolio under a single subscription licence to better suit the needs of businesses as they move towards digital transformation. The Veritas product portfolio already offers one of the industry’s broadest and most…

Read More
2017: The year data and analytics go mainstream

2017: The year data and analytics go mainstream

In 2017, the use of data and analytics will increase greatly, creating value both inside and outside organisations that have prepared for this shift, says Ted Friedman. To support a ‘data and analytics everywhere’ world, IT professionals need to create a new end-to-end architecture built for agility, scale and experimentation.…

Read More
ServiceNow survey shows 2018 as year of automation for routine enterprise work

ServiceNow survey shows 2018 as year of automation for routine enterprise work

ServiceNow has released the results of a new report, Today’s State of Work: At the Breaking Point, revealing that the majority of organisations have introduced advanced automation in their workplace, and nearly half of executives surveyed say they’ll require it more broadly by 2018 to cope with rising work volumes. The survey…

Read More
Could Fireball malware become the next Mirai?

Could Fireball malware become the next Mirai?

Researchers have recently uncovered a malware strain believed to have infected more than 250 million computers globally. It is further believed that this malware is present on 20 per cent of corporate networks. Dubbed ‘Fireball’, the massive malware infection originated in China and has caused disastrous outbreaks in Brazil, India…

Read More
Exploiting data breaches

Exploiting data breaches

High profile data breaches are regularly in the news and, seemingly, businesses are losing the battle to protect their intellectual property (IP), corporate and customer data from the threats posed by professional cybercriminals. It is no surprise that financial gain is the single biggest motivator for cyberattacks. The 2016, the…

Read More
WannaCry might be the tip of the iceberg

WannaCry might be the tip of the iceberg

The attack on 200,000 plus computers across more than 120 countries around the world by the WannaCry ransomware certainly got the attention of governments, media, consumers and law enforcement. But the actual impact could have been so much worse. Much ink is still being expended trying to determine who was…

Read More
Technology: Does it hinder or help creativity?

Technology: Does it hinder or help creativity?

Many people believe that the era of technology has changed our mindset in different ways. One of the most commonly asked questions is, has technology affected our creativity? Technology does not suppress creativity, in fact, technology enhances creativity. The difference between the two is that creativity comes from observing the…

Read More
Business case for data quality improvement

Business case for data quality improvement

Poor data quality destroys business value. Recent Gartner research shows that organisations estimate the average negative financial impact of poor data quality to be $9.7M per year. In other words, this is their estimate and the impact they believe it has on them per year This is likely to worsen…

Read More
Balancing the gender diversity balance sheet is important

Balancing the gender diversity balance sheet is important

Female talent is sparking a paradigm shift at the executive top table and overturning traditional boardroom cultures to increase business growth. Women in leadership roles are no longer operating from the sidelines, but showing how to build sustainable strategies and make incisive decisions that add value to customers and the…

Read More
Gearing up in the wireless world

Gearing up in the wireless world

The trends that defined the wireless network industry in 2016 are all still in play in 2017. While that might sound like more of the same, it can also be thought of as a prelude to 5G. Now is the time when mobile network operators (MNOs) are laying the groundwork…

Read More
Adoption of cloud based infrastructure accelerating

Adoption of cloud based infrastructure accelerating

It is likely that your approach to cloud infrastructure adoption was cautious at first. You may have limited your focus to rapid provisioning, or reducing equipment and operational costs. But the benefits of the cloud have been impossible to resist. It continues to evolve, gaining credibility across every industry. Today,…

Read More
Should you invest or outsource your security operations

Should you invest or outsource your security operations

As with any security service, three core pillars of operations are people, process and technology. In order to simplify understanding, we compare each of these options in two scenarios: as an in-house Security Operations Centre and as a Managed Security Services Provider. It is a known fact that Security Information…

Read More
What makes us Red Hat?

What makes us Red Hat?

Open source software is, in fact, eating the world. It is a de facto model for innovation, and technology as we know it, would look vastly different without it. On a few occasions, over the past several years, software industry observers have asked whether there will ever be another Red…

Read More
2016 Awards Banner

Latest Whitepapers

Whitepapers Covers
Whitepapers Covers
More Whitepapers
GITEX Advert