Home » Lists » Page 18

Lists

6 Common Cybersecurity Mistakes Made by Startup Companies

Image sourced from Pixabay Some of the most successful companies today began their journey as startups. They usually start with a brilliant idea or a new technology that promises to solve a problem to rethink the way we do business. The African region is no stranger to startups, where reports suggest that African startups raised near $5 billion in total estimated funding from 740 deals last year, predominantly in tech startups. This is more than a 250% increase from the $1.3-billion estimated total funding raised in 2020. Startup owners often draw attention to issues of business planning, marketing strategy, and attracting additional investment, but do not address the need to build a solid cybersecurity system. The lack of a clear understanding of threats can cost a startup a potentially s...

7 Key Security Practices to Teach Your Kids for Online Safety

Image sourced from Pixabay Educating children with the skills they need to protect themselves online can provide great benefits for families. Cybersecurity and digital privacy company Kaspersky shares 7 digital practices that parents can teach their children. In order to survive in today’s Internet world, everyone needs to have certain skills. While adults tend to acquire these skills as new technologies emerge, today’s children are almost born with a smartphone in their hands. It’s up to parents to teach them how to exist in a world that is constantly bombarded with information. Kaspersky experts recommend building these 7 habits for parents to help their children adjust to the Internet: Create a device-free time zone: When children use technology for a long time, they can become addicted...

Top 5 Games to Look Out for in 2022

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Every Sonic Youth Album, Ranked

Guitarists Thurston Moore and Lee Ranaldo and bassist Kim Gordon founded Sonic Youth in New York City in 1981, bringing Michigan-born drummer Steve Shelley on board to fill out the classic lineup in 1985. And for the next three decades, Sonic Youth ruled as one of alternative rock’s most influential bands, bringing alternate guitar tunings and feedback-drenched avant-garde noise to the major label world, headlining Lollapalooza, and even turning up on The Simpsons. Sonic Youth played its final show in 2011, with the band going on permanent hiatus after Thurston Moore and Kim Gordon’s divorce. But the band has continued to regularly release archival recordings, including several live albums issued directly to Bandcamp. And on March 18, Three Lobed Recordings will release In/Out/In, an excel...

6 Good Reasons Why ISPs in Africa Should Consider their Own Private Hosted Cloud

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Top 5 Women Breaking the Bias in the Ghanaian Tech Space

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

3 Technologies that are Reshaping the Banking Industry in Africa

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Does Solar Power Mean No More Load Shedding? 5 Common Misconceptions

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Celebrate Suga of BTS’ Birthday With These 10 Songs

Happy birthday to Suga of BTS! On this day (March 9th), a star was born, and it’s time to celebrate Min Yoongi/Agust D/Gloss/the primary resident of the Genius Lab. The rapper, writer, and producer turned 29 at the stroke of midnight KST — so grab some tangerines and join us by streaming our 10 favorite tracks. “Daechwita” [embedded content] Related Video He’s the king, he’s the boss, he’s Agust D, the edgy, no holds-barred alter ego under which Suga releases solo work. “Daechwita” was the lead single off 2020’s D-2, an audacious album in which Agust D addresses everything from existential crises, a bittersweet relationship with fame, and, of course, the haters. “Daechwita” is four and a half minutes of controlled chaos that makes me feel like I could run through a wall. “Off with their he...

Every Batman Movie Ranked From Worst to Best

This article was originally published in March 2016, prior to Batman v. Superman: Dawn of Justice. It has been updated to include that film as well as 2022’s The Batman. Batman’s lived so many lives. Whether it’s on page or onscreen, Bruce Wayne and his alter ego have occupied nearly every corner of the genre-sphere. From the garish comedy of Adam West’s kaleidoscopic crusader to the gravelly tones of Christian Bale’s dark knight, this is a franchise that’s proven its longevity and ability to evolve with the times. Batman’s modern reinvention came courtesy of Tim Burton, who in 1989 set the caped crusader against the gothic architecture and ominous strains of his aesthetic. It was an inspired pairing and one that’s seen its fair share of ups and downs as more cooks piled into the kitc...

4 Types of Hackers That You Probably Didn’t Know Existed

Image sourced from Pixabay A security hacker is someone who explores methods for breaching defences and exploiting weaknesses in a computer system or network. To the laymen, hackers are known as the bad guys of the internet, but it is way more than that, and there are many types of hackers that you probably have never heard of before. The most common attacks on the internet include malware, phishing, Man-in-the-Middle (MITM) attacks, Denial-of-Service (DOS) attacks, SQL injections, zero-day exploits, password attacks, and cross-site scripting. And all these types of attacks are the ones that gave hacking sort of a bad name. According to Kaspersky, MIT (Massachusetts Institute of Technology) became one of the first homes of hacking in 1969. They started out by altering software and hardware...

4 Important Things You Need to Know About ICASA’s Auction Tomorrow

After several years of delays, cancellations, court cases and the setting of further and further deadlines, the Independent Communications Authority of South Africa (ICASA) is finally set to auction access to SA’s much-coveted spectrum for mobile broadband services. Two auctions will be held – one on 8 March and another on 10 March. The second auction is considered the “main” auction. Here are 4 things you need to know about tomorrow’s ICASA auction: The Opt-In Phase Auction The first highly-anticipated auction will be held on Tuesday 8 March with every big name telecom in the country lining up to take a seat at the table. For the last several weeks, ICASA has conducted mock auctions and a bidder seminar to ensure that potential participants are comfortable with the bidding process. Accord...