Security Summit 2014
6:50

Everything you need to know - IT Salary Survey 2014

ITWeb's 14th annual IT Salary Survey captured a total of 5 385 valid responses - more than double the 2013 sample.

1:50
May 29, 2014

Greg Sinclair: Java exposed

To exploit Java, attackers mostly make use of the Blackhole Exploit Kit, says IBM's Greg Sinclair.

2:30
May 29, 2014

Mark Campbell: DDoS attacks go mainstream

The most common motivations for these attacks vary from political, online gaming and vandalism to extortion, says Arbor Networks.

2:20
May 29, 2014

Building SA's SOC framework

Security professionals develop a framework that enables security operations centres to be evaluated and improved in SA.

3:20
May 29, 2014

Info security: the six things business needs to know

Complexities and jargon often stand in the way of companies fully grasping the need to address information security.

1:50
May 29, 2014

Basie von Solms: Offence the best form of defence

Cyber attacks have become so sophisticated that being only defensive means losing the war, says UJ.

6:10

Take charge of DDOS defence

Distributed denial of service attacks have recently been used to hide sophisticated attempts to break into financial and e-commerce information.

2:10
May 29, 2014

Mai Moodley: Owning security beyond the job title

Organisations should move beyond merely complying with security policies that are put in place, says Mai Moodley, SITA.

2:50
May 29, 2014

Piet Pieterse: SAPS intensifies cyber crime battle

Technology, crime and methodology are interlinked, so adopt a wide approach to combatting cyber crime, says SAPS.

1:50
May 28, 2014

Jason Jordaan: Corruption fuels SA cyber crime

Even though local organisations have security systems, corrupt individuals are facilitating cyber crime, says SIU.

1:30
May 28, 2014

Matteo Michelini: Companies disregard need for response teams

Many organisations do not believe they need a computer security incident response team.