Traditional anti-virus models lose punch
With the increasing complexity in the threat landscape, anti-virus identifies malware but does nothing else, says Panda Security's Jeremy Matthews.
Consumer cloud services a threat to corporates
The free cloud services employees use can compromise valuable business data, said Nigel Hawthorn of Skyhigh Networks at the ITWeb Security Summit 2016.
Identity management key to cyber security
Identity and access management is key to protecting organisations from cyber attacks, says SailPoint.
Social engineering is 'psychological hacking'
Social engineer Jenny Radcliffe explains how one convincing person can bring cyber security to its knees.
Understand your network and security requirements
It's important to understand your network, your organisation and your business processes in order to fight cyber threats, says Rapid7's Craig Everson.
Different approach to cyber security needed
The present-day model of applying 'best practises' to address cyber security is no longer enough, says Grant Thornton.
Ransomware continues to skyrocket
Ransomware has been skyrocketing and we will continue to see different organisations rolling out new products and tools to fight it, says the CSIR's Jabu Mtsweni.
More organisations opt for cyber liability insurance
Cyber liability insurance is purchased either to reduce liability or to recover loss of valuable assets, says Risk Based Security's Jake Kouns.
Security breaches not caused by bad luck
Organisations tend to pin security breaches on bad luck and Murphy's Law, says Telkom's Steve Jump.
Info security outsourcing is almost inevitable
Slva Information Security MD Kris Budnik believes companies are getting used to the idea of outsourcing their information security function.
Security in a cloud-first, mobile-first world
There are a few necessary precautions companies need to take when employing mobile and cloud technology, says Microsoft's Cyril Voisin.
Application security exposes businesses
The majority of successful cyber security attacks target the application layer, says Checkmarx.