<center><ins data-revive-zoneid="124" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Our secrets to start-up success

People, skills, passion, perseverance – and contributing to society What’s the secret to being a successful start-up? The answer seems to lie in always thinking like one, even when you’ve grown into a billion rand company with thousands of staff, as Axel...

Compelling animation looks to dispel Ebola myths

A US church reports it has collaborated with Chocolate Moose Media and iHeed to create an animation for West Africa that dispels myths about how Ebola is spread and promotes prevention. “Our goal is to provide education that leads to better understanding to prevent...

Samsung sets MEA smartphone pace as Huawei jumps to second spot

The Middle East and Africa (MEA) handset market grew to its largest size in ten quarters in Q2 2014, expanding 27% year on year to total 64 million units. The latest insights from global advisory and consulting services firm International Data Corporation (IDC) show...

Five essential truths about cyber security

The very nature of cybersecurity doesn’t allow for a total solution. However, by instituting an enterprise-wide cyber plan, CFOs may at least achieve some measure of security.

Security firms look to wearables

When security incidents occur, management teams need to rely on eyewitness accounts as well as the guard’s version of events.

Financial services, healthcare wary of virtualisation

Financial Services and Healthcare sectors aren’t reaping the potential benefits that virtualized infrastructure can bring to their networks based on a fear of unfamiliar security technology creating compliance issues and other risk-factors.

What is Shellshock?

A significant vulnerability called Shellshock has emerged that impacts some half billion web servers and other Internet-connected devices including mobile phones, routers, medical devices, according to the threat defence experts at Trend Micro.

<center><ins data-revive-zoneid="61" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>
<center><ins data-revive-zoneid="62" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>
<center><ins data-revive-zoneid="63" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>
Share This