Cyber Security in 2017
2016 saw a huge number and variety of cyberattacks, ranging from a high-profile DDoS using hijacked Internet-facing security camerastothe alleged…
Blogs on tech trends, products, services and technologies, including cloud computing, security, artificial intelligence and more
2016 saw a huge number and variety of cyberattacks, ranging from a high-profile DDoS using hijacked Internet-facing security camerastothe alleged…
From malware to phishing and from hacking to theft of data storage devices, the risks of falling victim to a…
To help build an ecosystem around IBM Blockchain and the Linux Foundation Hyperledger Fabric, Big Blue is offering a program…
You can track diamonds and make payments with blockchains … but what link do they have with pork? Diamonds. Bitcoin….
Today’s business management solutions are powerful, adaptable and quick to pay for themselves—they represent a quantum leap over the rigid…
Pokémon Go has been around since July 2016 when it was first released and it has quickly become the latest…
Digital banking fraud is a growing concern for all of us, and few fraudulent exploits make more news than illegal…
CIO East Africa interviewed Greg Sarrail – Vice President, Solutions Business Development, Biometrics Lumidigm® brand, HID Global on Data security…
A couple of weeks ago, Kilimall Black Friday sale grew by 300%this year, three times more compared to 2015.The online…
How much electricity flows through the grid? When and where? Where are the bottlenecks? What happens when wind turbines and…
No more posts available. Thank you for scrolling this far.
No more posts available. Thank you for scrolling this far.