Subscribe
2:00

Traditional anti-virus models lose punch

With the increasing complexity in the threat landscape, anti-virus identifies malware but does nothing else, says Panda Security's Jeremy Matthews.

2:00
Darran RollsMay 19, 2016

Identity management key to cyber security

Identity and access management is key to protecting organisations from cyber attacks, says SailPoint.

3:50
Rapid7May 19, 2016

Understand your network and security requirements

It's important to understand your network, your organisation and your business processes in order to fight cyber threats, says Rapid7's Craig Everson.

3:10
Jabu MtsweniMay 19, 2016

Ransomware continues to skyrocket

Ransomware has been skyrocketing and we will continue to see different organisations rolling out new products and tools to fight it, says the CSIR's Jabu Mtsweni.

3:00
Jake KounsMay 19, 2016

More organisations opt for cyber liability insurance

Cyber liability insurance is purchased either to reduce liability or to recover loss of valuable assets, says Risk Based Security's Jake Kouns.

2:00
Rapid7May 19, 2016

Users the weakest link in security chain

The vast array of user-based attacks make them hard to prevent, so early detection is important, says Rapid7's Craig Everson.

2:10

Security breaches not caused by bad luck

Organisations tend to pin security breaches on bad luck and Murphy's Law, says Telkom's Steve Jump.

3:50

Info security outsourcing is almost inevitable

Slva Information Security MD Kris Budnik believes companies are getting used to the idea of outsourcing their information security function.

1:40

Security in a cloud-first, mobile-first world

There are a few necessary precautions companies need to take when employing mobile and cloud technology, says Microsoft's Cyril Voisin.

2:00

Application security exposes businesses

The majority of successful cyber security attacks target the application layer, says Checkmarx.

3:50
Tiyani NghonyamaMay 18, 2016

Youth lack public security information

Government and the private sector should come up with innovative solutions to increase public information security awareness, says Geekulcha.

2:20
Murray HunterMay 18, 2016

Rica needs greater transparency

There are loopholes in the Rica Act that are leading to surveillance abuse by intelligence agencies, says the Right2Know Campaign.