What's so cool about cold chain technology?
One academic’s long journey to forecasting Africa’s cold chain using data science and predictive modelling.
DevOps: not all doom and gloom
As the container evolution continues to gain traction worldwide, one company is helping businesses to adopt clusters without the complexity.
You’ve been hacked. NOW WHAT?
A cyberattack can cripple a company’s operations, but quick action can limit the damage. In the event of a security breach, here’s what you need to know.
To get South Africa out of the slow lane of EV transformation, a team of engineers from Stellenbosch University are turning to public transport.
Life is for breaking all the rules
How did a boy from Pretoria become a billionaire entrepreneur? / Exercise, eat healthy…blah blah blah. You’ve heard it all, right?
Jaws of the future
Is it a small boat? Someone’s lost luggage? It’s a Roomba in the water!
How to arm your inbox
How can businesses maximise email security while navigating the complexities of human error?
Sweet dreams are made of this
Good for business…even better for your brain. The sleep industry is booming, but is the technology actually making a difference?
Bots meet students where they’re at
How one university is digitally filling the access gap in mental healthcare with a chatbot.
A means to an endpoint
In a world where hybrid work is now the norm and millions of connected devices form the IoT ecosystem, endpoint security is one of the most important and often overlooked components of a company’s security strategy.
Charting a course to safer seafaring
All aboard...and all a part of a human cyber-physical system.
Security in a post-quantum world
What challenge do quantum computers pose in the field of cryptography?
Risk, compliance and cybersecurity
Combining culture and compliance frameworks with proper risk management strategies.