IoT growth expected to see more than 50bn connected devices in next decade
While the Internet of Things (IoT) may still be an emerging technology, it is difficult to dispute that it has…
While the Internet of Things (IoT) may still be an emerging technology, it is difficult to dispute that it has…
The state of data privacy is a widely discussed topic of conversation. The new EU data protection law is setting…
We’ve all been there. You send a message, you see the recipient has read the message as the two blue…
Uganda has received three High Tech pioneering laboratory machines to speed up the process of testing and treating patients for…
If you think IT decision-makers (ITDMs) are too busy/important/serious to use social media, then we have a surprise for you….
At first glance, the deployment of cybersecurity measures and the pursuit of innovation might seem mutually exclusive. Strategies to enhance…
Data governance definition Data governance is a system for defining who within an organization has authority and control over data…
Phishing definition Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the…
In the early days of artificial intelligence, computer scientists attempted to recreate aspects of the human mind in the computer….
RobbinHood ransomware comes with both a vulnerable driver and a malicious driver that has the sole purpose of taking out…
No more posts available. Thank you for scrolling this far.
No more posts available. Thank you for scrolling this far.