BYOD security: A risky business…

BYOD security: A risky business…

BYOD has been a hot trend for some time now. More and more workers are using their personal cellphones and tablets to access company data. Research company Gartner predicts that by 2017, 50% of businesses will require their staff to supply their own devices for...
Firms alarmingly unprepared for hacks

Firms alarmingly unprepared for hacks

By Martin Walshaw, senior engineer, F5 Networks. Anonymous Africa’s recent Distributed Denial of Service (DDoS) attacks on the SABC and Oakbay Investments aimed to flood the websites of both companies with tons of information, eventually rendering the sites virtually...
New threats drive growing GRC role

New threats drive growing GRC role

Kathy Gibson reports from SAPInsider in Viennan June 2016 – The governance, risk and compliance (GRC) landscape brings unique challenges to a diverse range of end user customers. These include increased regulatory compliance; changing economic and political...
PoPI: The Internet changes everything…

PoPI: The Internet changes everything…

The Protection of Personal Information (PoPI) Act has been signed into law and will soon be implemented.  For organisations yet to become PoPI compliant soon, it is going to have huge implications not only for policies, but how they enable these processes and ensure...
How can IT deliver on business needs?

How can IT deliver on business needs?

Kathy Gibson reported from IDC Cloud and Data Centre Roadshow in Rosebank – Whether CIOs acknowledge it or not, the proliferation of smartphones is having a fundamental impact on their IT planning, and they are having to rethink how they deliver applications. Today,...