ESET launches Smart TV Security

IT security leader ESET has launched ESET Smart TV Security – an advanced technology protection solution against targeted malware attacks on connected TVs and other devices with the Android TV operational system. According to statistics, there could be as many as 30 billion devices connected to the internet by 2020. While these gadgets bring numerous…

Startupbootcamp Hosts FastTracks to Source Top Startup Talent Across the Globe

Startupbootcamp (SBC) (www.Startupbootcamp.org), a global family of industry-focused accelerators, last year launched its first-ever Africa-based programme. Building on the success of its inaugural 2017 Cape Town tech venture accelerator program, SBC Cape Town (http://bit.ly/SBCFastTracks) now embarks upon its FastTrack tour for 2018 – sourcing top-tier tech startups to join the programme’s second year. The first-ever…

DDoS Intelligence Quarterly Report Reveals Accidental Attacks and Cybercriminals’ Quest for Cash

Accidental DDoS attacks by spammers, political sabotage and the owners of DDoS botnets attempting to make money from Bitcoin – these are just some of the trends analysed in Kaspersky Lab’s fourth quarter report for 2017 based on data from Kaspersky DDoS Intelligence*.   The number of countries where the resources of DDoS botnet victims are located…

Consider these five things on a managed SD-WAN service provider

Software defined wide area networks (SD-WANs) are accelerating in the market. “Businesses are recognising the tangible benefits SD-WANs offer – from cost to speed to ease of control and agility. An issue businesses are however still grappling with is how to evaluate a managed SD-WAN service provider,” says Anton Jacobsz, managing director at Networks Unlimited…

2018 gears up for exciting new mobile app trends

As businesses adopt digital transformation strategies to venture into new income streams as well as remain competitive, the need for speed remains a major driver in the crucial business differential of delivering great customer experiences quickly. However, as organisations adopt DevOps methodologies, they frequently find that current networking architectures are a limiting factor. Traditional network…

Cyber security: How to get around it!

 It is pretty much a given that the majority of people have their personal information documented somewhere in virtual space. This data has been captured in many forms and bits and bytes through online transactions, social engagement, studies, business and work, shopping, medical treatments, and also through play (such as answering those fun personality quizzes…