Subscribe
2:30

Zero Day is every day

Real-time intelligence and smart analytics are critical to fight Zero Day attacks, says WebSense.

1:50

Anonymous thrives under faceless guise

There are two sides of the coin when it comes to hactivist group Anonymous, warned security strategist Joshua Corman.

2:10
AnonymousMay 17, 2012

Twinterview: Joshua Corman on Anonymous

Joshua Corman shares some insights on the hacktivism group in a brief Twinterview with ITWeb following the Security Summit.

7:10

DOC calls for collaboration, security innovation

Government is planning a cyber security hub and calls on security institutions to get involved.

2:00
Mobile devicesMay 17, 2012

Security overlooked for productivity

Employees must understand the need for security policies or they will sidestep them, says Old Mutual.

2:10
BitcoinMay 17, 2012

E-money raises privacy concerns

There is still time to put protection into place before moving to a cashless society, says Lydia Group.

3:40
InfosecMay 17, 2012

Hacktivism and what we can learn from it

Infosec's Bevan Lane outlines the motivations behind current hacktivist attacks and how companies can protect themselves.

2:50
Security SummitMay 17, 2012

Identity control is IT reality

Identity exploitation is the leading cause of security failures, says SuperVision Biometric Systems.

2:50
UJMay 17, 2012

SA's elusive cyber security policy

No one knows where the country stands on the issue of cyber crime.

1:30

'Anyone can commit cyber crime'

Adaptive persistent adversaries are a growing force of persistent hackers that will force IT security to change tactics, says Akamai.

2:20
Android OSMay 16, 2012

Android OS hacked at Security Summit

Audience left shell-shocked after data, such as passwords and SMSes, is retrieved from the operating system.

3:20
Mobile devicesMay 16, 2012

Securing mobile devices

Entersect highlights scenarios that render mobile devices vulnerable to attacks, arguing for ways to better secure them.