Read time 3:40

Security Summit 2014 wrap-up: rebuilding trust

Evolution was the overarching theme for enterprise security experts, away from point products and towards more effective security practices.

Greg Sinclair: Java exposed

May 29, 2014

To exploit Java, attackers mostly make use of the Blackhole Exploit Kit, says IBM's Greg Sinclair.

Mark Campbell: DDoS attacks go mainstream

May 29, 2014

The most common motivations for these attacks vary from political, online gaming and vandalism to extortion, says Arbor Networks.

Basie von Solms: Offence the best form of defence

May 29, 2014

Cyber attacks have become so sophisticated that being only defensive means losing the war, says UJ.

Take charge of DDOS defence

Distributed denial of service attacks have recently been used to hide sophisticated attempts to break into financial and e-commerce information.

Piet Pieterse: SAPS intensifies cyber crime battle

May 29, 2014

Technology, crime and methodology are interlinked, so adopt a wide approach to combatting cyber crime, says SAPS.

Jason Jordaan: Corruption fuels SA cyber crime

May 28, 2014

Even though local organisations have security systems, corrupt individuals are facilitating cyber crime, says SIU.