Security Summit 2014

Everything you need to know - IT Salary Survey 2014

ITWeb's 14th annual IT Salary Survey captured a total of 5 385 valid responses - more than double the 2013 sample.

May 29, 2014

Greg Sinclair: Java exposed

To exploit Java, attackers mostly make use of the Blackhole Exploit Kit, says IBM's Greg Sinclair.

May 29, 2014

Mark Campbell: DDoS attacks go mainstream

The most common motivations for these attacks vary from political, online gaming and vandalism to extortion, says Arbor Networks.

May 29, 2014

Building SA's SOC framework

Security professionals develop a framework that enables security operations centres to be evaluated and improved in SA.

May 29, 2014

Info security: the six things business needs to know

Complexities and jargon often stand in the way of companies fully grasping the need to address information security.

May 29, 2014

Basie von Solms: Offence the best form of defence

Cyber attacks have become so sophisticated that being only defensive means losing the war, says UJ.


Take charge of DDOS defence

Distributed denial of service attacks have recently been used to hide sophisticated attempts to break into financial and e-commerce information.

May 29, 2014

Mai Moodley: Owning security beyond the job title

Organisations should move beyond merely complying with security policies that are put in place, says Mai Moodley, SITA.

May 29, 2014

Piet Pieterse: SAPS intensifies cyber crime battle

Technology, crime and methodology are interlinked, so adopt a wide approach to combatting cyber crime, says SAPS.

May 28, 2014

Jason Jordaan: Corruption fuels SA cyber crime

Even though local organisations have security systems, corrupt individuals are facilitating cyber crime, says SIU.

May 28, 2014

Matteo Michelini: Companies disregard need for response teams

Many organisations do not believe they need a computer security incident response team.