Security: Exploiting data breaches

Security: Exploiting data breaches

By Michael Marriott, Digital Shadows security expert High profile data breaches are regularly in the news and, seemingly, businesses and are losing the battle to protect their intellectual property (IP), corporate, and customer data from the threats posed by...
M2M communication and IoT

M2M communication and IoT

By Johan Scheepers, Commvault Systems Engineering Director for MESAT When it comes to big data, South Africa is keeping up with the rest of the world, however. One of the largest concerns for many South African CIOs is the management of this data. Rising technologies,...