Open post
Rock-solid data resilience is the only option

Rock-solid data resilience is the only option

Why backups, high availability and immutability should be the foundation of all companies’ cyber security strategy. Let’s kick off by answering the question – why should backup, high availability and immutability be the foundation of cyber security strategies? In a nutshell, because together they provide a rock-solid comprehensive cyber security strategy that delivers resilience against a […]

Continue readingMore Tag
Open post
Why zero trust needs an integrated platform

Why zero trust needs an integrated platform

Successful zero trust can only be accomplished through the construction of an integrated platform that shares information across different security technologies. To reach this level of security, it is essential to have an integrated platform that can centralise and correlate information from various security technologies and tools that have traditionally operated in their own silos. To achieve […]

Continue readingMore Tag
Open post
Why Zero Trust must be an essential part of cybersecurity strategy

Why Zero Trust must be an essential part of cybersecurity strategy

In the early days of computing, security was relatively simple since computers were isolated entities. Physical security was sufficient, with authorised users being granted access to a computer room. However, with the advent of computer networking and the internet, security became more complex. The concept of a physical perimeter protecting the network emerged, one could […]

Continue readingMore Tag
Open post
Powering resilience

Powering resilience

In 2022, South Africans experienced 205 days of load-shedding,(1) with a CSIR report stating that businesses and individuals had no electricity for 43% of the hours in the year.(2) January 2023 saw predictions of the same amount of load-shedding this year, but the reality has been far worse. 21 March marked the first full-day suspension […]

Continue readingMore Tag
Open post
SASE versus Zero Trust: Removing the mud from the water

SASE versus Zero Trust: Removing the mud from the water

The Zero Trust network access approach gains popularity with security professionals, as it addresses many of the shortcomings of the traditional method. According to Gartner, Security Service Edge (SSE) secures access to the web, cloud services and private applications. Capabilities include access control, threat protection, data security, security monitoring and acceptable-use control enforced by network-based and API-based integration. SSE […]

Continue readingMore Tag

Posts navigation

1 2 3 4 5 6 7 8 9 26 27 28