White paper: Data resilience readiness for Africa’s digital leaders
Insights from the Veeam–ITWeb Survey into the data protection and recovery strategies of African organisations.
Malawi election results marred by tech challenges
The Malawi Electoral Commission confirmed yesterday media reports of problems with the network when sending out election results.
Zambia pushes updated laws to regulate digital transactions
Escalation of cyber security challenges and evolving technology has led to Zambia’s government introducing two new bills to govern the digital economy.
AI abuse overshadows Namibia’s e-signature drive
AI-generated scam video features government ministers purportedly endorsing an official investment scheme.
Microsoft dismantles Nigerian-led phishing syndicate
Microsoft, in partnership with Cloudflare and the USA Secret Service, has seized 338 websites tied to RaccoonO365, a phishing-as-a-service scheme believed to be led by Nigerian operator Joshua Ogundipe.
Cyber-attacks are a serious threat to the green shoots
South Africa’s mining sector has finally recorded growth after two consecutive quarters of decline, with Q2 output up 3.7%. While this signals a welcome recovery, there is an increasing risk of cyberattacks that may jeopardise the mining sector.
Why is Angola prime target of cyber attacks?
In an interview, Rudi van Rooyen, security engineer and evangelist at Check Point Technologies, explained why Angola was the most targeted.
Namibia expediates cyber security partnership with India
As Namibia seeks to improve digital transformation, it has tasked relevant ministries to focus on ensuring cyber security challenges get resolved.
Nigeria offsets telecoms duty losses with digital tax gains
The government has reshaped its fiscal policy to give some financial relief to telecoms consumers, while clawing back money from big tech companies operating in the country.
Zoho says Nigeria offers global model for responsible AI adoption
Research published by the software firm demonstrates that most Nigerian firms have already adopted AI in some form, while also improving data protection.
Liquid C2, AvePoint alliance to push cloud services in Africa
Liquid C2 believes that incorporating AvePoint’s solutions into its services enables the company to strengthen its existing offerings and help clients close cyber security gaps.
How attackers exploit information overload to stay hidden; how CTEM addresses this challenge
CTEM continuously detects, prioritises, validates and remedies security exposures in real-time, says Andrzej Jarmolowicz, operations director at Cybershure.