E-bidding sites are usually massively profitable for the owner, at the expense of bidders, says SensePost security analyst.
The Protection of Personal Information Bill will act as a service differentiator, say speakers at ITWeb's Security Summit.
Technical expertise is not a must to become a cyber criminal, says M86 Security's Bradley Anstis.
Too much information is available online and SA needs to govern what can be posted about its citizens.
Regulations and policies are needed to regulate military use of information security, says Patrick Gray, host of the RiskyBusiness Security News Podcast.
The 2011 Enterprise Excellence Award winners are the North Carolina Office of State Controller and RBS Group.
ITWeb Governance, Risk & Compliance FEB 2025
Aligning GRC with Business Innovation and Agility
Tech expert, Jacques Malan, will reveal a day in the life of a computer crime scene investigator during tomorrow's Security Summit.
The audit by ICASA, which has been two years in the making, has yet to get off the ground.
The Treasury Department listed the corporation under its existing sanctions regime against the Libyan government.
Chinese tech titans clash, Anonymous denies PlayStation attack, smartphone market in 'perfect storm', and Samsung eyes Chrome OS device.
The company has filed lawsuits in Germany, France, and Hungary against ZTE for patent and trademark infringement.
Scott McClellan, VP of cloud services, reportedly updated his LinkedIn profile with details on what HP is building.
The Northwest Federal Credit Union fights financial crime with SAS Anti-Money Laundering.