Padlock and laptop keyboard. Cyber security concept

Cybersecurity outlook: Planning for protection

Protecting against cyber-threats has never been more important. In September, according to Hacker News, the US government dismantled the Raptor Train botnet that managed to capture more than 200,000 devices; there was a rise in phishing lures using potent ...

Caucasian advisor financial business analytics woman with data dashboard graphs

Empower decision-making with Power BI and Azure

How Mint can help you harness the power of Microsoft's data and analytics solutions Analytics are, as Microsoft describes, ‘the cornerstone for businesses in today’s rapidly evolving digital economy’. Digital is the other key word here. It is a digital-f ...

Padlock and key

The Skeleton Key That Unlocks Your Data

There are plenty of articles talking about how companies can analyse their data at scale. What tools they should use to leap into their lakes of data and what solutions are on offer to ensure the data is secure, clean and relevant. Few answer one very imp ...

Smart phone security concept

Scalable and secure DevOps practices with Azure

Limited development tools can directly impact DevOps scalability and security. Forrester’s Total Economic Impact study of Azure Integration Services found that a ‘lack of automation by integration and DevOps’ was a leading cause of delays, mistakes, poor ...

The Great Migration in Africa

The Comprehensive Guide to Cloud Migration with Azure

Planning a migration to the cloud can be daunting for any organisation. The upfront time investment required to plan infrastructure modernisation, data strategy and ideal cloud architecture can seem overwhelming. This leads many organisations to defer the ...