There is a need to change how the data industry operates, which should be incapsulated in a professional body and associated methodology.
Research indicates that adoption of artificial intelligence is lagging in South Africa’s vital small and medium enterprise sector. Why?
The ‘CIA triad’ is a baseline standard for evaluating and implementing measures to enhance confidentiality, integrity and availability in modern IT security.
Monitoring and analysing customer sentiment conversations, across social media and online channels, can be done with speed and accuracy.
Companies now have the technological capability to be more, offer more and provide more for the end-user.
Smart analytics broadens the business operations role of financial executives, exposing hidden patterns, risks and new opportunities.
Companies need to define the business problem of a possible cyber security breach, and recognise the need for multiple layers of defence.
Four reasons why organisations should move away from the siloed data management approach and go the holistic route.
The Zero Trust network access approach gains popularity with security professionals, as it addresses many of the shortcomings of the traditional method.
Corporate data is under threat like never before and it's also never been more difficult to protect, as ransomware, cyber criminals and insider threats proliferate.
The challenges of identity management for network and application access need no longer put security teams on the back foot.
Harnessing the power of unstructured data allows companies to discover hidden insights, uncover trends and make data-driven decisions.
Sixty-one percent of surveyed IT professionals in SA report feeling burned out at work – are you part of the problem or the solution?