ITWeb's 14th annual IT Salary Survey captured a total of 5 385 valid responses - more than double the 2013 sample.
To exploit Java, attackers mostly make use of the Blackhole Exploit Kit, says IBM's Greg Sinclair.
The most common motivations for these attacks vary from political, online gaming and vandalism to extortion, says Arbor Networks.
Security professionals develop a framework that enables security operations centres to be evaluated and improved in SA.
Complexities and jargon often stand in the way of companies fully grasping the need to address information security.
Cyber attacks have become so sophisticated that being only defensive means losing the war, says UJ.
Distributed denial of service attacks have recently been used to hide sophisticated attempts to break into financial and e-commerce information.
Organisations should move beyond merely complying with security policies that are put in place, says Mai Moodley, SITA.
Technology, crime and methodology are interlinked, so adopt a wide approach to combatting cyber crime, says SAPS.
Even though local organisations have security systems, corrupt individuals are facilitating cyber crime, says SIU.
Many organisations do not believe they need a computer security incident response team.
Corruption is so prevalent that criminals can easily access networks, delegates heard at the ITWeb Security Summit.