Open post
Embarking on a Zero Trust journey

Embarking on a Zero Trust journey

If feeling overwhelmed at the scope of the Zero Trust architecture, get the basics out of the way first. Here’s how. You’ve heard it all before − the IT landscape is spreading, with hybrid infrastructure combined with SaaS applications, hosted plus on-premises environments and remote workers − all adding to the sprawl and all with […]

Continue readingMore Tag
Open post
Squaring the software security circle

Squaring the software security circle

Veracode is using artificial intelligence to make applications more secure – at the speed of business. Two hacks over the last 12 months in South Africa – at the Companies and Intellectual Property Commission of South Africa (CIPC) and a famous retailer – illustrate yet again how urgent is the need for a multi-layered approach to security, […]

Continue readingMore Tag
Open post
Eliminate the security chaos

Eliminate the Security Chaos

CISOs and CIOs increasingly adopt information security management systems to improve their security posture and manage it going forward. A quick internet search on the current cyber threat landscape will yield any number of gloomy statistics. Add to that the fact that artificial intelligence (AI) is expected to give already well-resourced cyber criminals even more […]

Continue readingMore Tag
Open post
Resolve automation complexity, eliminate missed SLAs with automation analytics, intelligence

Resolve automation complexity, eliminate missed SLAs with automation analytics, intelligence

Many organisations on digital transformation journeys are struggling with the automation of supporting business workloads. This is primarily due to increased complexity and the need to operate across multiple applications and platforms such as mainframes, distributed systems plus multiple cloud providers.  “Improving automation maturity is essential to the success of these business transformations and it […]

Continue readingMore Tag
Open post
How to reduce disaster recovery readiness testing times by up to 75% with 80% fewer resources

How to reduce disaster recovery readiness testing times by up to 75% with 80% fewer resources

Disaster recovery (DR) readiness is a necessity for today’s highly digitalised companies and an important item on any board agenda. CIOs must be able to prove, with full documentary evidence, that the business is operationally resilient from an IT perspective. This can turn out to be extremely difficult using partially automated and manually operated tests, […]

Continue readingMore Tag
Open post
Truth or dare: Should we trust artificial intelligence?

Truth or dare: Should we trust artificial intelligence?

Artificial intelligence (AI) can directly or indirectly affect cyber security in a multitude of ways, with various examples of ChatGPT exposing corporate data. One such case is that of Samsung, which allowed engineers at its semiconductor division to use ChatGPT to help fix problems with source code. The employees mistakenly entered top-secret data for a new programme, and […]

Continue readingMore Tag

Posts navigation

1 2