The majority of companies that use operational technology systems (OT) or networks, fail to see these as being vulnerable and susceptible to risk, says Nclose.
Intelligence can support incident detection, incident response, training and awareness, security architecture, and many other aspects of a security programme, says Rapid7.
The increasing adoption of digital business strategies is challenging conventional approaches to security and risk management, says Eskom.
We need to look to emulate our attackers, or rather, to imitate specific characteristics that they display.
It is deepening its security offering with the Thales partnership ahead of information-protection act.
The hackathon is challenging disruptive innovators to build the most secure systems possible, says ITWeb.
Tiyani Nghonyama, COO and CTO of Geekulcha, gives tips on how to protect yourself when using public WiFi.
Infosec decision-makers rely less on common sense and independent investigation and are more likely to fall prey to hype and fear, uncertainty and doubt, says Net-Square Solutions' Saumil Shah.
Risk and security leaders need balance the imperative to protect the enterprises with the need to adopt innovative technology approaches, says Eskom.
It's not possible to effectively teach students technical concepts if you don't know how to do it yourself, says Manuel Corregedor.
Businesses should start looking at 'incentivising' IOT device manufacturers to ensure that these devices are secure by design, says IS.
Jason Jordaan, principal forensic scientist and MD of DFIRLABS, discusses his journey into the field of digital forensics.