ITWeb Security Summit 2019
2:30

Development doesn’t stop with #SS19Hack for young geeks

#SS19Hack participants are receiving further mentoring and support, says Geekulcha’s Nghonyama.

4:20

EDR, EPP convergence to strengthen neglected endpoint

Traditional antivirus alone is not enough as endpoint remains most vulnerable part of ICT infrastructure.

3:40
Jun 11, 2019

The state of SA’s IT security, according to ITWeb/VMware CISO survey

How are South African corporates dealing with the increasing challenges of cyber security? ITWeb’s annual survey, sponsored by VMware, provides some answers.

3:00
Jun 11, 2019

Businesses have the home field advantage over attackers

We should know our assets better than our adversaries, says Carbon Black.

4:30
Jun 10, 2019

Effective end-to-end security framework

Companies must have all the relevant frameworks in place to protect what is critical for every firm nowadays: its data, says Brett Skinner, security sales manager for Micro Focus.

4:00

Supply chain security: what could possibly go wrong?

You must who in your supply chain is connected to your network, says Telkom’s Steve Jump.

2:40

IOT devices are attacked within five minutes of being connected

Netscout warns that more entrants in the IOT space facilitate worm-like propagation of malware and pose significant DDOS threat.

2:40

Why you need a CASB

Cloud Access Security Brokers help implement enterprise security policies in the cloud, says Forcepoint.

4:10
Jun 3, 2019

Minimising reputational damage after a breach

Badly-handled communications can worsen the situation for an organisation that has fallen victim to a cyber attack, says Brunswick’s Marina Bidoli.

4:10
May 31, 2019

Winners of #SS19Hack announced

Three teams of young coders and an overall individual winner were awarded for their solutions to “secure the future citizen”.

2:30

Battle lines drawn in coming cyber war

What’s the worst that can happen in a cyber attack? Plenty, says Pukhraj Singh.

5:40
May 31, 2019

Even your bot needs to have a manageable identity

Identity governance platforms will need to evolve to identify and manage not only humans, but the non-human elements in our systems.

Related topics