CISOs and CIOs increasingly adopt information security management systems to improve their security posture and manage it going forward. A quick internet search on the current cyber threat landscape will yield any number of gloomy statistics. Add to that the fact that artificial intelligence (AI) is expected to give already well-resourced cyber criminals even more […]
Continue readingMore TagTag: CASA
Resolve automation complexity, eliminate missed SLAs with automation analytics, intelligence
Many organisations on digital transformation journeys are struggling with the automation of supporting business workloads. This is primarily due to increased complexity and the need to operate across multiple applications and platforms such as mainframes, distributed systems plus multiple cloud providers. “Improving automation maturity is essential to the success of these business transformations and it […]
Continue readingMore TagHow to reduce disaster recovery readiness testing times by up to 75% with 80% fewer resources
Disaster recovery (DR) readiness is a necessity for today’s highly digitalised companies and an important item on any board agenda. CIOs must be able to prove, with full documentary evidence, that the business is operationally resilient from an IT perspective. This can turn out to be extremely difficult using partially automated and manually operated tests, […]
Continue readingMore TagSymantec Endpoint Security Adaptive Protection from CA Southern Africa
Enterprises across the globe are heavily invested in endpoint security to protect valuable assets. CA Southern Africa (CASA) reveals despite the time and money spent, more breaches are happening today than ever before. Why is that? “While the technology certainly has a role to play with some security solution offerings, lower protection levels and an […]
Continue readingMore TagAI’s potential for good in the cyber security space
Cyber security professionals can use generative AI to better defend against the attackers who are using the same AI tools to create attacks. When people engage in the artificial intelligence (AI) debate, top of the list of concerns is often the intellectual property (IP) and copyright issue, especially regarding code generation or creative outputs from […]
Continue readingMore TagTruth or dare: Should we trust artificial intelligence?
Artificial intelligence (AI) can directly or indirectly affect cyber security in a multitude of ways, with various examples of ChatGPT exposing corporate data. One such case is that of Samsung, which allowed engineers at its semiconductor division to use ChatGPT to help fix problems with source code. The employees mistakenly entered top-secret data for a new programme, and […]
Continue readingMore TagLet’s get real: AI is part of our here and now
Let’s kick off by positioning artificial intelligence (AI) – not just in the cyber security and automation space, but in our everyday lives. It’s easy to think you are a voyeur in the artificial intelligence (AI) debate, as realistically speaking, what has it got to do with you and your life today – surely, it’s a […]
Continue readingMore TagCA Southern Africa delivers Symantec Enterprise Cloud to SA’s largest corporations
Symantec Enterprise Cloud, a Broadcom cyber security solution, brings data-centric hybrid security for the largest and most complex organisations in the world. It enables enterprises to meet legal, regulatory and corporate data compliance requirements. Symantec Enterprise Cloud also empowers today’s modern workforce to securely access sensitive company assets from anywhere. “It unifies intelligence across control points, enabling […]
Continue readingMore TagWhy zero trust needs an integrated platform
Successful zero trust can only be accomplished through the construction of an integrated platform that shares information across different security technologies. To reach this level of security, it is essential to have an integrated platform that can centralise and correlate information from various security technologies and tools that have traditionally operated in their own silos. To achieve […]
Continue readingMore TagSASE versus Zero Trust: Removing the mud from the water
The Zero Trust network access approach gains popularity with security professionals, as it addresses many of the shortcomings of the traditional method. According to Gartner, Security Service Edge (SSE) secures access to the web, cloud services and private applications. Capabilities include access control, threat protection, data security, security monitoring and acceptable-use control enforced by network-based and API-based integration. SSE […]
Continue readingMore Tag