Frustrated by fragmented war news, Anghami’s Elie Habib built World Monitor, a platform that fuses global data, like aircraft signals and satellite detections, to track conflicts as they unfold.
Smile ID, Africa’s leading identity verification company, has released its 2026 Digital Identity Fraud Report — “From Selfies to Signals: Identity Enters the Security Era.”. The report finds that AI has rapidly reduced the cost, while increasing the scalability and quality of deepfake fraud. In addition, as identity becomes part of the fabric of many […]
In an expected move in the African streaming landscape, MultiChoice has officially announced the termination of its flagship streaming service, Showmax. The decision, described as the result of a “comprehensive review,” marks a stunning end to the platform that once stood as the continent’s primary challenger to global streaming titans. The curtain is falling on […]
The partners have unveiled a co-branded app that combines Western Union’s global payout network with Sasai’s local payment options and digital onboarding.
joshuark writes: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a VMware Aria Operations vulnerability tracked as CVE-2026-22719 to its Known Exploited Vulnerabilities catalog, flagging the flaw as exploited in attacks. VMware Aria Operations is an enterprise monitoring platform that helps organizations track the performance and health of servers, networks, and cloud...
The multi-phase deployment, delivered by NEC XON and partners, involved the design, migration, optimisation and operational handover of a next-generation secure access platform.
Reverse billing applies to specific registered domains, approved IP ranges, hosted document downloads, secure web portals, payment pages and application forms.
The support and life cycle management offering is designed to strengthen reliability and service continuity for companies deploying H3C networking solutions.
The solutions are data security posture management; directory management; identity management; identity threat detection and response; privileged access management; and endpoint management.