The modern day information security agenda is an issue business and government now take seriously, says security analyst Patrick Gray.
The practical application of data analysis in information security often fails due to a lack of skills, says Mohamed Khan, infosec senior analyst at Transnet Corporate.
Being a part of the online world puts users in danger of privacy invasion, but this can be avoided.
More collaboration and education needed, says Tanzanian cyber security expert.
Universal problems with wireless technology, which need to be resolved by device manufacturers, pose the biggest threat to users.
Security options built into cloud devices are insufficient to protect all the device's resources, says an independent security researcher.
Trend Micro will showcase its endpoint, custom defence, virtualisation and cloud security solutions at ITWeb Security Summit 2015.
The field of digital forensics in SA has seen significant growth over the past year-and-a-half.
SecureData explains how its data collection helps protect end-users against threats.
Securing an organisation's perimeter is only the start when it comes to thwarting cyber attacks, says MWR InfoSecurity SA.
CensorNet outlines the main elements keeping IT managers up at night when it comes to the use of cloud applications.