Security
3:20
Thursday

Industrial cyber crime reaches 'pandemic proportions'

Industrial cyber crime levels have escalated significantly over the past year, as criminals stop at nothing to bring city metros to their feet.

2:00
Thursday

The Web is dark, and full of phishers

Cyber criminals are cashing in on the popularity of Game of Thrones to spread phishing scams, says Check Point.

1:40

ITR Technology: Five IT security best practices

These include developing an intelligence-driven strategy to prevent advanced attacks, and implementing gateway security and multi-factor authentication.

2:20

nCipher, Credence Security extend distribution agreement

The extended agreement will see the two companies pursue additional opportunities for information and application security across the sub-Saharan Africa region.

1:50

ITWeb, VMware second CISO survey under way

The survey will result in a research report about the unique challenges facing SA's top cyber security professionals.

1:50

Partner with experts for effective cyber security solutions

Delegates attending the ITWeb Security Summit, in Johannesburg, from 28-29 May, can find out how CyberTech secures company data.

4:40
Wednesday

Balancing prevention, continuity and recovery

Let's broaden the data security conversation to highlight the importance of business continuity and disaster recovery plans.

2:30

Security analytics must be able to serve everyone

We are measuring how helpful the analytical outcome is on an alert by alert basis, says Cisco.

2:20

KHIPU debuts proactive security operations centre

The SOC, based in Port Elizabeth, will proactively detect modern-day cyber threats with incident response and remediation services.

0:40
Tuesday

White paper: Regulating the Use of Cloud Computing by Financial Institutions

Cloud computing is transforming how IT is used by the financial services industry, says Microsoft.

1:10

Network traffic analytics accelerates threat detection

BLTS believes network traffic analytics is the ultimate way to detect and investigate security threats across the network.