Transparency in F&B supply chain promotes consumer trust

65% of shoppers would switch from a brand they usually buy to another that is more transparent about its products’ origins and supply chain.

Unleashing the power of email lead-gen for business

When done right, well-crafted emails can supercharge your B2B lead generation game

Overcoming resistance to changing operating model

Research at Accenture found that 74% of executives need to rethink their existing operating model entirely,

Why action-first approach to big data is key

The future of data analytics isn’t about what you’ve got, it’s about how you use it, and technology exists for businesses to compare internal data to publicly available information to identify weak spots and turn them into strengths.

Kaspersky Lab Cyber Security Weekend

While malware in general continues its relentless growth, Africa faces particular threats in the areas of industrial systems and mobile payments. Kathy Gibson joined Kaspersky Lab for its Cyber Security Weekend in Cape Town to learn more.   Threats to look out...

Agri-business: Rooftop farms next big thing?

“Providing food for the community gives me a sense of purpose. It is also important to set an example for other women and show we can be successful, run businesses and provide food for our families and communities.”

Opinion: Technology’s role in reducing insurance fraud

Within the healthcare sector, for example, insurance fraud is a significant and costly issue on a global scale. There is no regulation of fees, so healthcare providers have free reign to charge at their own discretion…

Demystifying DMaaS – and noting why you need it

Reputation is the number one criterion to look out for when choosing a DMaaS provider. It is also essential to ensure that they are experts in data management, and use leading technology to deliver a complete, seamless and end-to-end solution.

Forecasting in an age of digital disruption

In pioneering companies, it’s often the Chief Finance Officers CFOs) who are leading the charge, challenging the way the enterprise traditionally looks at and consumes data, and championing an innovative, data-driven approach.

See the teen Cyber Ninja hack a drone

“My first hack was a Windows PC – a really old one that took a long time. I tried to hack it with a credential harvester attack to get user names and details. But doing this I learned about command lines.”

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.