Industry Expert

Data centre investment leaders highlight Africa investment opportunity

Large scale data centre investment opportunities are increasing in sub-Saharan Africa as key commercial hubs benefit from the critical combination of high quality international backbone infrastructure (subsea cable)...

Cyber crime alert! The rise and rise of exploit kits

Cherif Sleiman, VP EMEA at Infoblox discusses the increasing prevalence and risks posed by exploit kits, the evolution of this threat and how companies can defend against them. For several months now, there has been...

Choosing the right scanner – the first step to digitalisation and efficient d...

There’s more to the capture step of document imaging than just putting paper through a scanner. Image capture is about making documents as sharp and legible as possible for online viewing, printing and reading by data e...

What’s next for Mirai and botnet DDoS attacks?

For security professionals, Mirai has become a household name. It’s the now-infamous malware that hackers use to absorb hundreds of thousands of connected devices – from routers, to DVRs, IP cameras and other gadgets – i...

Managing email security

Mimecast has conducted a survey of 600 IT security managers from organisations in the South Africa, United States, United Kingdom, and Australia. The initial findings of that survey were released in 2016. The average...

Why system, network and incident logs are so important

Every device on an enterprise network generates log data. Log data provides exhaustive information about what is happening. It records events such as start-ups and shutdowns, commands executed, login and logoff...