According to Arcserve Southern Africa, implementing a comprehensive approach to cyber security and data protection are the first proactive steps to strengthening the security posture of any business. Organisations such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework 2.0 is an excellent resource that assists companies to achieve better security as it offers guidelines […]
Continue readingMore TagAuthor: phindib
Arcserve SA flags importance of data resilience
According to Arcserve Southern Africa, a global survey commissioned by Arcserve reveals 83% of IT decision-makers are now including data resilience in their business strategies, but only 23% are reported to have a mature approach to it. Data resilience refers to an organisation’s ability to recover from data breaches and other types of data loss; immediately […]
Continue readingMore TagLeveraging Hexagon EAM for Environmental Responsibility
In today’s world, sustainability has become a cornerstone of corporate responsibility. Companies recognize the need to integrate sustainable practices into their operations to reduce environmental impact and meet regulatory requirements. Hexagon’s Enterprise Asset Management (EAM) solutions play a pivotal role in helping organizations achieve sustainability goals by optimizing resource usage, reducing waste, and enhancing energy […]
Continue readingMore TagArtificial intelligence tools enhance application security
Unpacking some of the magic surrounding artificial intelligence and revealing what it can do to secure business applications. Artificial intelligence (AI) is not only the flavour of the month − it may well end up being the game-changer of the century. Having said this, information regarding it can be buried in jargon that conceals the […]
Continue readingMore TagGetting the best from an endpoint protection solution
An effective solution must enable a clear understanding of the security posture, where to invest, and how to improve and mitigate. The days of box-ticking security protection are over, as companies can no longer deploy solutions that merely satisfy audit or governance requirements. Cyber security is a serious business due to the relentless and rapid rate of […]
Continue readingMore TagiOCO collaboration protection secures Office 365
With 345 million paid seats, Microsoft Office 365 is perhaps the world’s most popular cloud-based collaboration platform. Individuals and businesses of all sizes rely on Exchange Online, Teams, OneDrive and SharePoint to provide a collaboration platform, crucial in today’s hybrid work environments. “The cloud in general, and Office 365 in particular, have played a significant […]
Continue readingMore TagGearing up for the future
Gearing Up for the Future The automotive industry remains in a transforming world of fast emerging technologies and new market demands. The result, more often than not, is unpredictable sales that lead to overproduction and overstocking, or underproduction, lost opportunities, and frustrated customers. The ripple effects of this stress profit margins even lower due to […]
Continue readingMore TagReduce application security debt with AI, Veracode Fix
A recent study highlights the growth in security debt and reveals that finding and fixing flaws is becoming increasingly critical if potential costly hacks are to be avoided. For those unfamiliar with the term, let’s start by defining security debt. It is the accumulation of unfixed or unresolved security vulnerabilities, software that is out of date […]
Continue readingMore TagNavigating New Digital Seas: CNOI’s Voyage Towards Excellence with Infor Cloudsuite Industrial Enterprise
The Chantier Naval de l’Océan Indien (CNOI), a leading shipyard located in Mauritius, specialises in shipbuilding, repair, and maritime engineering projects. With a reputation for quality and innovation, CNOI has been at the forefront of integrating advanced technologies to enhance its operational efficiencies and services since its inception in 2001. Challenges Prior to 2023, CNOI […]
Continue readingMore TagEmbarking on a Zero Trust journey
If feeling overwhelmed at the scope of the Zero Trust architecture, get the basics out of the way first. Here’s how. You’ve heard it all before − the IT landscape is spreading, with hybrid infrastructure combined with SaaS applications, hosted plus on-premises environments and remote workers − all adding to the sprawl and all with […]
Continue readingMore Tag