-
Network Peripherals: A Weak Link in Security and an Open Gateway for Attackers
In a world where 300 million computers are connected by the internet, the opportunity to tap new revenue streams for a slice of the global security pie has never been greater – but neither has the risk. The warp speed of IT has also brought with it a degree of […]
Author Archive
-
Unregulated Information Highway is Non-traditional Security Threat
The UN debates the dangers of the internet, forcing cyberspace onto the international community’s arms control agenda. read more
-
Global Employment Trends for Youth: 2011 Update
Are prospects for youth employment better or worse than predicted in the GET Youth 2010? What are the latest figures? What has changed since the report was released, where and why? These are some of the questions that will be examined in the present update. [issuu width=420 height=296 backgroundColor=%23222222 documentId=111223125050-c9027a0dcf074dcabea13ba76787353a name=wcms_165455 […]
-
Youth Employment
Youth employment has grown in prominence on national and global development agendas. The youth employment challenge has its own dimensions and confronts countries worldwide regardless of their stage of socio-economic development. The underlying problems are the large number of young people entering the labour markets every year, the lack of […]
-
Putting Young Africans to Work
Putting Young Africans to Work: Addressing Africa’s youth unemployment crisis draws on a series of Dialogues held in May 2011 with the governments of Zambia, Mozambique and Swaziland. The Dialogues were convened by The Brenthurst Foundation and com- prised distinguished experts from the United States, Costa Rica, Argentina, the Ivory […]