Open post
Eliminate the security chaos

Eliminate the Security Chaos

CISOs and CIOs increasingly adopt information security management systems to improve their security posture and manage it going forward. A quick internet search on the current cyber threat landscape will yield any number of gloomy statistics. Add to that the fact that artificial intelligence (AI) is expected to give already well-resourced cyber criminals even more […]

Continue readingMore Tag
Open post
Resolve automation complexity, eliminate missed SLAs with automation analytics, intelligence

Resolve automation complexity, eliminate missed SLAs with automation analytics, intelligence

Many organisations on digital transformation journeys are struggling with the automation of supporting business workloads. This is primarily due to increased complexity and the need to operate across multiple applications and platforms such as mainframes, distributed systems plus multiple cloud providers.  “Improving automation maturity is essential to the success of these business transformations and it […]

Continue readingMore Tag
Open post
How to reduce disaster recovery readiness testing times by up to 75% with 80% fewer resources

How to reduce disaster recovery readiness testing times by up to 75% with 80% fewer resources

Disaster recovery (DR) readiness is a necessity for today’s highly digitalised companies and an important item on any board agenda. CIOs must be able to prove, with full documentary evidence, that the business is operationally resilient from an IT perspective. This can turn out to be extremely difficult using partially automated and manually operated tests, […]

Continue readingMore Tag
Open post
Truth or dare: Should we trust artificial intelligence?

Truth or dare: Should we trust artificial intelligence?

Artificial intelligence (AI) can directly or indirectly affect cyber security in a multitude of ways, with various examples of ChatGPT exposing corporate data. One such case is that of Samsung, which allowed engineers at its semiconductor division to use ChatGPT to help fix problems with source code. The employees mistakenly entered top-secret data for a new programme, and […]

Continue readingMore Tag
Open post
CA Southern Africa delivers Symantec Enterprise Cloud to SA’s largest corporations

CA Southern Africa delivers Symantec Enterprise Cloud to SA’s largest corporations

Symantec Enterprise Cloud, a Broadcom cyber security solution, brings data-centric hybrid security for the largest and most complex organisations in the world. It enables enterprises to meet legal, regulatory and corporate data compliance requirements. Symantec Enterprise Cloud also empowers today’s modern workforce to securely access sensitive company assets from anywhere. “It unifies intelligence across control points, enabling […]

Continue readingMore Tag
Open post
Why zero trust needs an integrated platform

Why zero trust needs an integrated platform

Successful zero trust can only be accomplished through the construction of an integrated platform that shares information across different security technologies. To reach this level of security, it is essential to have an integrated platform that can centralise and correlate information from various security technologies and tools that have traditionally operated in their own silos. To achieve […]

Continue readingMore Tag
Open post
SASE versus Zero Trust: Removing the mud from the water

SASE versus Zero Trust: Removing the mud from the water

The Zero Trust network access approach gains popularity with security professionals, as it addresses many of the shortcomings of the traditional method. According to Gartner, Security Service Edge (SSE) secures access to the web, cloud services and private applications. Capabilities include access control, threat protection, data security, security monitoring and acceptable-use control enforced by network-based and API-based integration. SSE […]

Continue readingMore Tag

Posts navigation

1 2