REdimension invests in The Good People Data Company
REdimension says this partnership allows it to further enhance services and expand its reach.
ITWeb reporter
2:50
Ghana, Guinea, Nigeria popular targets of DDoS attacks
Ghana, Guinea, Nigeria, Côte d'Ivoire, Liberia, Benin, Senegal, Mali, and Cameroon had the highest number of cyber-attacks, according to NETSCOUT.
1:40
SoftTalk’s new privacy feature hides users’ profiles on chats
SoftTalk has enabled users to turn off and on their profiles from the SoftTalk directory if they prefer to remain anonymous in the course of a public search.
1:40
BetterHome, TGPDC tap into data to transform SA home industry
The companies will work together to provide data services to speed up the house buying process.
1:30
Concerns over Starlink application in Botswana
The application by low-orbit satellite service, Starlink, to operate in Botswana is mired in uncertainty.
3:40
SAFPS partners with TGPDC to tackle fraud
The partners will collaborate using multiple technology solutions in tackling money laundering, fraud and impersonation crimes.
2:00
AMS-IX, MDXi launch a new internet exchange in Nigeria
AMS-IX Lagos aims to become a content hub for West Africa, enabling regional and local ISPs, carriers, and internet exchanges to aggregate content.
2:40
500 young African women join third CyberGirls fellowship
This year's cohort was selected from over 20 000 applications received from across Africa, highlighting the growing interest in cyber security among African women.
2:40
SmartCrypto’s Crypto Framework and Golden Thread
We offer Smart-Trusted-Solutions to enhance trust in a global digital economy.
1:10
Professional Video Security o Building Automationo Access Control
MOBOTIX presents pioneering innovations.
2:30
Biometrics poised to simplify mobile enterprise security
Fingerprint, facial or voice recognition technologies can make the process of accessing a device significantly faster and simpler.
5:40
OPINION: Mobile identity and access services key to IAM
The assertion that identity and access management is critical to a connected security ecosystem.