Cyanre MD Danny Myburgh discussed the merits and restrictions of digital forensics at ITWeb Security Summit 2015.
Organisations should identify likely types of attackers and their motives to guide their security decisions, says MWR InfoSecurity.
Organisations need visibility into the use of cloud applications to understand the risk they present, said CensorNet.
If end-users lack awareness about cyber attacks, they remain the weakest link in IT security, says Symantec.
Perpetrators in the West African country are repeat, unrepentant offenders, says EFCC's Abdulkarim Chukkol.
As social media use rises, the subjective notion of privacy will lead to confusion, says SITA's Maiendra Moodley.
Do 'real' security, not just compliance, urges Reino Mostert, a security analyst at Telspace Systems, speaking at ITWeb Security Summit 2015.
The CSIR embarks on a research project to quantify key infrastructure vulnerabilities in SA.
Technical issues are not the reason behind information security project failure, says Mobius Consulting.
The majority of hacks in SA are masterminded by syndicates, says DFIRLabs.
ATM fraud and other common crimes related to financial gain are costly to Tanzania, says an expert.
Most of the data stolen by hackers resides in the organisation's database, says MyDBA.