News
Insight Consulting has announced a strategic partnership with cybersecurity specialist company Obrela. Through the ...
Westcon-Comstor’s Cisco-focused Comstor arm has launched a managed SOC (security operations centre) offering that enables partners to tap into the cybersecurity services market while avoiding the cost ...
Global financial services provider Apex Group has opened its fifth South African office in Tshwane. Apex Group has established offices in five new jurisdictions in 2025 thus far, bringing the total ...
AI-powered agents are rapidly transforming how South African businesses operate, from chatbots managing customer inquiries to automated systems processing financial transactions. By Boland Lithebe, ...
AI-driven optimisation, seamless integrations and intuitive management, writes Tony Bartlett, director of data centre compute at Dell Technologies South Africa. You’ve got dozens of e-mails, tickets ...
With cyber threats becoming more sophisticated and more frequent, organisations are under pressure to prioritise their ...
As part of Google Cloud Next ’25, Google has explored enhancements coming to Google Workspace, its team collaboration platform. The enhancements are fueled by Gemini, Google’s most capable set of ...
IWG has announced the appointment of Carolyn Elliman as the new country manager for South Africa and the southern African region. Elliman has taken on several management roles at IWG since joining the ...
AMD’s next-generation AMD EPYC processor, codenamed “Venice”, has become the first HPC product in the industry to be taped out and brought up on the TSMC advanced 2nm (N2) process technology. This ...
Define and document business system integration and data flow, aligning with enterprise architecture guidelines. Integrate applications and data to create cohesive and consistent user experiences.
Define and document business system integration and data flow, aligning with enterprise architecture guidelines. Integrate applications and data to create cohesive and consistent user experiences.
Cybercriminals continue to pivot to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined, according to IBM’s newly-released 2025 X-Force ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results