Subscribe
7:30

Everything you need to know - IT Salary Survey 2014

ITWeb's 14th annual IT Salary Survey captured a total of 5 385 valid responses - more than double the 2013 sample.

2:00
Greg SinclairMay 29, 2014

Greg Sinclair: Java exposed

To exploit Java, attackers mostly make use of the Blackhole Exploit Kit, says IBM's Greg Sinclair.

2:40
Mark CampbellMay 29, 2014

Mark Campbell: DDoS attacks go mainstream

The most common motivations for these attacks vary from political, online gaming and vandalism to extortion, says Arbor Networks.

2:30
Alapan ArnabMay 29, 2014

Building SA's SOC framework

Security professionals develop a framework that enables security operations centres to be evaluated and improved in SA.

3:30
Steve JumpMay 29, 2014

Info security: the six things business needs to know

Complexities and jargon often stand in the way of companies fully grasping the need to address information security.

1:50
Basie von SolmsMay 29, 2014

Basie von Solms: Offence the best form of defence

Cyber attacks have become so sophisticated that being only defensive means losing the war, says UJ.

6:10

Take charge of DDOS defence

Distributed denial of service attacks have recently been used to hide sophisticated attempts to break into financial and e-commerce information.

2:10
Mai MoodleyMay 29, 2014

Mai Moodley: Owning security beyond the job title

Organisations should move beyond merely complying with security policies that are put in place, says Mai Moodley, SITA.

2:50
Piet PieterseMay 29, 2014

Piet Pieterse: SAPS intensifies cyber crime battle

Technology, crime and methodology are interlinked, so adopt a wide approach to combatting cyber crime, says SAPS.

2:00
Jason JordaanMay 28, 2014

Jason Jordaan: Corruption fuels SA cyber crime

Even though local organisations have security systems, corrupt individuals are facilitating cyber crime, says SIU.

1:40
Matteo MicheliniMay 28, 2014

Matteo Michelini: Companies disregard need for response teams

Many organisations do not believe they need a computer security incident response team.

1:50
Jason JordaanMay 28, 2014

Jason Jordaan: Hacking: no tools required

Corruption is so prevalent that criminals can easily access networks, delegates heard at the ITWeb Security Summit.