Security teams should avoid externalising risk to users, said security expert Jessy Irwin at ITWeb Security Summit 2017.
Author opens ITWeb's Security Summit, likening her role as a writer to those of security professionals.
Threat intelligence is analysed information about the capability, intent and opportunities of cyber threats, says Rapid7's Rebekah Brown.
What everyone should be striving for is to mitigate as much risk as possible and make it exceedingly difficult for cyber criminals to impact their resources.
South African organisations are focusing too heavily on the technical aspects of solution implementation, says Mobius Consulting.
The Northern Cape Department of Economic Development and Tourism commissions a parallel Security Hackathon in Kimberley.
Penetration testing for compliance purposes is far different to penetration testing to identify and eliminate security issues, says Offensive Security.
The #SS17HACK preselection process uncovered up-and-coming infosec professionals, who delivered on-point ideas.
All businesses will be attacked at some point, so it's important to think about how to prepare for it, says Cognosec.
DNS is a standard service that scales to large volumes and is easy to take advantage of to address distributed clients, says Stefanutti Stocks Corporate Services.
Humans are the weakest link in any security chain, and many breaches are caused by the human element, says AfICTA.