Magazine Button

Latest Videos

Sightings search for phishing and malware attacks

In this video, ServiceNow demonstrates how to use the sighting search feature to locate phished users, and track phishing and malware observables within the log store on your network.

Executive Guide to the NTT Security 2019 Global Threat Intelligence Report

Here, Dimension Data provide all the facts and figures you need to know about the latest cyberthreat landscape and what to do about bolstering your organisation’s cybersecurity.

Twenty Questions with Niantic CEO John Hanke

John Hanke, the CEO of Niantic and the creator of Pokémon Go shares his thoughts on the current state of augmented reality, the ethics of AI, and the superiority of giant squids over pretty much all other creatures.

Lenovo previews world’s first foldable PC

From never-before-seen form factors to new user experiences, Lenovo’s innovation history is laden with firsts that have continued to define and re-imagine smart, personalised computing. And, another breakthrough is on the horizon. Accelerate has unveiled a demo of the world’s first foldable PC. Made for highly mobile, tech-savvy professionals who demand the best tools, the new […]

Forcepoint’s approach to cybersecurity

Forcepoint CIO Meerah Rajavel, Chief Scientist Dr. Richard Ford, and head of X-Labs Raffael Marty talk about the unique ways that Forcepoint is approaching cybersecurity through a behaviour-centric model.

How to get 100 Million users on Blockchain

Alex Mashinsky, Founder and CEO, Celsius Network, speaks about finding and scaling the Killer App and Payment systems while bringing 100 million users onto Blockchain.

Customers talk about using the Community Tablet platform

The Community Tablet is a digital platform transported around rural African communities in partnership with NGOs and organisations such as World Bank to educate on topics including immunisation, financial awareness and how to prevent disease spreading. It was created by Mozambican entrepreneur Dayn Amade who identified some of the ways NGOs could improve their approach […]

Are you prepared to be cyber resilient?

Are you prepared to be cyber resilient in the digital age? No longer is it good enough to be aware of cybersecurity. Today, it is all about embracing an all-encompassing approach that includes cybersecurity, disaster recovery and business continuity management. The core principle behind the Syrex approach is adopting a layered way of managing cybersecurity. […]

Mimecast provide its thoughts on World Password Day

To change security behaviour effectively, Mimecast says that employees have to know what to do, care enough to improve, and then do what’s right when it matters.

The cloud explained for business: What is the cloud?

Technology is a big cost for any business, if not the biggest. This is due to the direct reliance between business performance and business applications. For example, a slow Point of Sale system at a retailer or cumbersome customer information interface at a branch office effectively slows down the time of the transaction. Well-oiled technology […]

Five ways automation puts time on your side during a DDos attack

A10 Networks has explored five ways automation can significantly improve your response time during a DDos attack. DDos attacks can be catastrophic, but the right knowledge and tactics can drastically improve your chances of avoiding and successfully mitigating attacks.

Winners of the Digital Lab Africa pitch competition announced

Digital Lab Africa (DLA), a springboard and incubation platform for African creatives in digital content, has announced the 10 winning projects of this year’s edition of the DLA accelerator programme. Initiated by the Embassy of France and French Institute in South Africa (IFAS), DLA is managed by the South African technology hub Tshimologong Digital Innovation […]

Browse our latest issue

Magazine Cover

View Magazine Archive