Subscribe
1:20

White hat hackers need protection

Charlie Miller, principal research consultant for Accuvant Labs, shows how easy it is to jailbreak the iPhone.

1:10
Network securityMay 16, 2012

How secure is your network?

Poorly configured technology and uneducated staff present security risks, says SANS instructor Steve Armstrong.

2:40

Security can learn from medical practice

The medical industry avoided a global crisis through collaboration, something the IT world is reluctant to do.

2:20
Cyber warfareMay 16, 2012

The art of cyber warfare

The Internet has changed modern warfare and, although in an artificial environment, has several aspects that must be considered, says cyber expert.

0:40
PerformantaMay 16, 2012

What people do online

Daily, people send billions of e-mails and spend hours on social media.

2:40
Security SummitMay 16, 2012

SAP security must be holistic

Attackers know how to find SAP systems using regular search engines, warns Onapsis.

2:30
SIRv12May 16, 2012

SA threat trend on downward slope

Microsoft's latest security intelligence report shows that SA is making headway in the fight against malware and threatening software.

2:10
PerformantaMay 16, 2012

Poisoned search engines a risk

End-users must protect themselves from being tricked into accessing Web sites that host malicious software, says Performanta.

1:30
MalwareMay 16, 2012

Top 10 threats in SA

Microsoft's latest security report tables the threats that were most prevalent in SA in the second half of 2011.

3:30
SensePostMay 16, 2012

Mobile threat in Africa

By 2015, there will be more people with mobile access than with electricity - a game changer, says SensePost.

2:40
CyanreMay 16, 2012

'At the sound of the beep, leave your spyware'

Cyber forensic analyst Bennie Labuschagne outlines what can and can't be extracted by employers from employee devices.

3:50
SecurityMay 15, 2012

Security is a big data problem

Leading organisations manage advanced threats by analysing enormous volumes of information, thus achieving more situational awareness, says RSA.

1:50

Information security needs fresh approach

The security industry is using old technology to solve new threats, says Haroon Meer, founder of and researcher at Thinkst.