Security Summit 2015

Digital forensics demands legal compliance

Cyanre MD Danny Myburgh discussed the merits and restrictions of digital forensics at ITWeb Security Summit 2015.


What are you trying to prevent?

Organisations should identify likely types of attackers and their motives to guide their security decisions, says MWR InfoSecurity.


Cloud redefines security

Organisations need visibility into the use of cloud applications to understand the risk they present, said CensorNet.


End-users are juicy targets for hackers

If end-users lack awareness about cyber attacks, they remain the weakest link in IT security, says Symantec.

May 28, 2015

Nigerian cyber crime net widens

Perpetrators in the West African country are repeat, unrepentant offenders, says EFCC's Abdulkarim Chukkol.


Social media spurs privacy paradox

As social media use rises, the subjective notion of privacy will lead to confusion, says SITA's Maiendra Moodley.


'We are failing at infosec'

Do 'real' security, not just compliance, urges Reino Mostert, a security analyst at Telspace Systems, speaking at ITWeb Security Summit 2015.


Why infosec projects bomb

Technical issues are not the reason behind information security project failure, says Mobius Consulting.


Syndicates wreak havoc in cyber space

The majority of hacks in SA are masterminded by syndicates, says DFIRLabs.

May 27, 2015

Cyber risks and trends in Africa

ATM fraud and other common crimes related to financial gain are costly to Tanzania, says an expert.


Six steps to secure databases

Most of the data stolen by hackers resides in the organisation's database, says MyDBA.