Subscribe
1:20

Digital forensics demands legal compliance

Cyanre MD Danny Myburgh discussed the merits and restrictions of digital forensics at ITWeb Security Summit 2015.

2:20

What are you trying to prevent?

Organisations should identify likely types of attackers and their motives to guide their security decisions, says MWR InfoSecurity.

2:10

Cloud redefines security

Organisations need visibility into the use of cloud applications to understand the risk they present, said CensorNet.

2:50

End-users are juicy targets for hackers

If end-users lack awareness about cyber attacks, they remain the weakest link in IT security, says Symantec.

3:50
NigeriaMay 28, 2015

Nigerian cyber crime net widens

Perpetrators in the West African country are repeat, unrepentant offenders, says EFCC's Abdulkarim Chukkol.

4:20

Social media spurs privacy paradox

As social media use rises, the subjective notion of privacy will lead to confusion, says SITA's Maiendra Moodley.

2:10

'We are failing at infosec'

Do 'real' security, not just compliance, urges Reino Mostert, a security analyst at Telspace Systems, speaking at ITWeb Security Summit 2015.

1:20
Mobius ConsultingMay 28, 2015

Why infosec projects bomb

Technical issues are not the reason behind information security project failure, says Mobius Consulting.

4:00

Syndicates wreak havoc in cyber space

The majority of hacks in SA are masterminded by syndicates, says DFIRLabs.

2:20
TanzaniaMay 27, 2015

Cyber risks and trends in Africa

ATM fraud and other common crimes related to financial gain are costly to Tanzania, says an expert.

2:20

Six steps to secure databases

Most of the data stolen by hackers resides in the organisation's database, says MyDBA.

2:00

Closing the security gap

Embrace hacker culture by collectively seeking out security flaws and fixing them, suggests a security expert.