News

31 May 2019 - by Matthew Burbidge Battle lines drawn in coming cyber war
Battle lines drawn in coming cyber war

What’s the worst that can happen in a cyber attack? Plenty, says Pukhraj Singh.

31 May 2019 - by Paula Gilbert Even your bot needs to have a manageable identity
Even your bot needs to have a manageable identity

Identity governance platforms will need to evolve to identify and manage not only humans, but the non-human elements in our systems.

30 May 2019 - by Marilyn de Villiers Plan like a marketer, test like an attacker
Plan like a marketer, test like an attacker

Most IT security failures occur because cyber criminals know the psychology of human nature and how to exploit it.

29 May 2019 - by Kirsten Doyle Constant need for profit sees cyber security suffer
Constant need for profit sees cyber security suffer

Security is hard because business is hostile to anything that does not bring profit, says the Institute for Security and Open Methodologies.

28 May 2019 - by Matthew Burbidge Don't lie about being hacked
Don't lie about being hacked

The response to the breach is more important than the breach, says security researcher Graham Cluley.

28 May 2019 - by Kirsten Doyle Curb machine learning expectations in security
Curb machine learning expectations in security

Rather than being used in isolation, machine learning must act as another layer to boost security, says Cisco distinguished engineer TK Keanini.

05 Jun 2019 - by Ivo Vegter We’re horrifically exposed, expert tells CISOs
We’re horrifically exposed, expert tells CISOs

South Africa is not well-protected against cyber threats, CISOs heard at ITWeb Executive Round Table.

03 Jun 2019 - by Admire Moyo Minimising reputational damage after a breach
Minimising reputational damage after a breach

Badly-handled communications can worsen the situation for an organisation that has fallen victim to a cyber attack, says Brunswick’s Marina Bidoli.

31 May 2019 - by Simon Foulds Winners of #SS19Hack announced
Winners of #SS19Hack announced

Three teams of young coders and an overall individual winner were awarded for their solutions to “secure the future citizen”.

31 May 2019 - by Tracy Burrows Cyber law: Which county’s legislation should SA align with?
Cyber law: Which county’s legislation should SA align with?

International cyber crime, trade wars raise challenges in legislation and prosecution, say UKZN researchers.

31 May 2019 - by Tracy Burrows DevOps needs DevSecOps
DevOps needs DevSecOps

Any company moving to DevOps models needs to incorporate DevSecOps too.

30 May 2019 - by Marilyn de Villiers Security professional, your job is not to fight fires
Security professional, your job is not to fight fires

The biggest mistake IT security teams – and management – make when responding to a cyber attack is to treat it as if it were a fire, says IT forensic expert Jason Jordaan.

30 May 2019 - by Sibahle Malinga Do you have a true perception of your IT environment?
Do you have a true perception of your IT environment?

Independent security consultant Kris Budnik discussed the importance of situational awareness in implementing an effective risk management strategy.

30 May 2019 - by Paula Gilbert Biometrics, digital signatures stop insider criminal thinking
Biometrics, digital signatures stop insider criminal thinking

LAWtrust’s Maeson Maherry explains how strong authentication and transactions tied to digital signatures can secure an organisation from the inside out.

29 May 2019 - by Tracy Burrows Insider attacks remain the top security risk
Insider attacks remain the top security risk

Tight budgets, uncertain ROI and lack of time delay investment in IT security, the new ITWeb/VMware survey found.

29 May 2019 - by Matthew Burbidge Can SA survive a cyber attack?
Can SA survive a cyber attack?

How prepared is SA for an attack? It depends on who you ask.

29 May 2019 - by Simnikiwe Mzekandaba SA is ‘safe haven for cyber criminals’
SA is ‘safe haven for cyber criminals’

Government must act urgently to adopt the Cyber Crimes Bill, as the country cannot continue without this critical legislation being in place, says a cyber security specialist.

29 May 2019 - by Paula Gilbert Cisco sees strong shift towards SD-WAN
Cisco sees strong shift towards SD-WAN

Cisco is seeing a lot of interest in the adoption of SD-WAN technology

29 May 2019 - by Marilyn de Villiers Adopting military tactics to fight the cyber war
Adopting military tactics to fight the cyber war

While we cannot predict the future of cyber attacks, we can prepare by training people by drawing on military tactics, says CyberGym.

29 May 2019 - by Christopher Tredger Visibility, intelligence at the heart of next-generation security
Visibility, intelligence at the heart of next-generation security

Built-in intelligence and visibility are the hallmarks of the next-generation cyber security technology.

28 May 2019 - by Brian Ngobese #SS19hack underway at Security Summit 2019
#SS19hack underway at Security Summit 2019

Thirteen teams are competing to win the secure IOT application challenge.

28 May 2019 - by Tracy Burrows Cyber war could cripple a country in a month
Cyber war could cripple a country in a month

Government may not be taking the risk of cyber attack on critical infrastructure seriously enough, says DFIR Labs’s lead forensic analyst.

28 May 2019 - by Kirsten Doyle Truth is a security problem, says SensePost's Van der Walt
Truth is a security problem, says SensePost's Van der Walt

It’s our job to ensure the appropriate security of data. Every time we fail, it’s a setback for a free and open society.

28 May 2019 - by ITWeb Redstor rescues vets hit by ransomware attack
Redstor rescues vets hit by ransomware attack

Thanks to InstantData, Redstor's user-driven technology, Teva Veterinary Clinic was up and running within an hour.

28 May 2019 - by ITWeb PwC focuses on cyber attacks
PwC focuses on cyber attacks

As companies increasingly embrace digitisation, automation and artificial intelligence, the risk of cyber crime continues to grow, says PwC.

09 May 2019 - by Kirsten Doyle Proper cyber hygiene critical across all industries
Proper cyber hygiene critical across all industries

When positioning security culture, dialogue and collaboration are key, so make employees part of the solution, says SecureMySocial.

Event Sponsor

Diamond Sponsor

Platinum Sponsors

Security Survey & Executive Roundtable Sponsor

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Display Sponsors

Showcase Sponsor

Sponsor

Endorsed by

 

pDBException: [1]: Database not defined