A recent study highlights the growth in security debt and reveals that finding and fixing flaws is becoming increasingly critical if potential costly hacks are to be avoided. For those unfamiliar with the term, let’s start by defining security debt. It is the accumulation of unfixed or unresolved security vulnerabilities, software that is out of date […]
Continue readingMore TagTag: CASA
Embarking on a Zero Trust journey
If feeling overwhelmed at the scope of the Zero Trust architecture, get the basics out of the way first. Here’s how. You’ve heard it all before − the IT landscape is spreading, with hybrid infrastructure combined with SaaS applications, hosted plus on-premises environments and remote workers − all adding to the sprawl and all with […]
Continue readingMore TagSquaring the software security circle
Veracode is using artificial intelligence to make applications more secure – at the speed of business. Two hacks over the last 12 months in South Africa – at the Companies and Intellectual Property Commission of South Africa (CIPC) and a famous retailer – illustrate yet again how urgent is the need for a multi-layered approach to security, […]
Continue readingMore TagEliminate the Security Chaos
CISOs and CIOs increasingly adopt information security management systems to improve their security posture and manage it going forward. A quick internet search on the current cyber threat landscape will yield any number of gloomy statistics. Add to that the fact that artificial intelligence (AI) is expected to give already well-resourced cyber criminals even more […]
Continue readingMore TagResolve automation complexity, eliminate missed SLAs with automation analytics, intelligence
Many organisations on digital transformation journeys are struggling with the automation of supporting business workloads. This is primarily due to increased complexity and the need to operate across multiple applications and platforms such as mainframes, distributed systems plus multiple cloud providers. “Improving automation maturity is essential to the success of these business transformations and it […]
Continue readingMore TagHow to reduce disaster recovery readiness testing times by up to 75% with 80% fewer resources
Disaster recovery (DR) readiness is a necessity for today’s highly digitalised companies and an important item on any board agenda. CIOs must be able to prove, with full documentary evidence, that the business is operationally resilient from an IT perspective. This can turn out to be extremely difficult using partially automated and manually operated tests, […]
Continue readingMore TagSymantec Endpoint Security Adaptive Protection from CA Southern Africa
Enterprises across the globe are heavily invested in endpoint security to protect valuable assets. CA Southern Africa (CASA) reveals despite the time and money spent, more breaches are happening today than ever before. Why is that? “While the technology certainly has a role to play with some security solution offerings, lower protection levels and an […]
Continue readingMore TagAI’s potential for good in the cyber security space
Cyber security professionals can use generative AI to better defend against the attackers who are using the same AI tools to create attacks. When people engage in the artificial intelligence (AI) debate, top of the list of concerns is often the intellectual property (IP) and copyright issue, especially regarding code generation or creative outputs from […]
Continue readingMore TagTruth or dare: Should we trust artificial intelligence?
Artificial intelligence (AI) can directly or indirectly affect cyber security in a multitude of ways, with various examples of ChatGPT exposing corporate data. One such case is that of Samsung, which allowed engineers at its semiconductor division to use ChatGPT to help fix problems with source code. The employees mistakenly entered top-secret data for a new programme, and […]
Continue readingMore TagLet’s get real: AI is part of our here and now
Let’s kick off by positioning artificial intelligence (AI) – not just in the cyber security and automation space, but in our everyday lives. It’s easy to think you are a voyeur in the artificial intelligence (AI) debate, as realistically speaking, what has it got to do with you and your life today – surely, it’s a […]
Continue readingMore Tag