According to Arcserve Southern Africa, implementing a comprehensive approach to cyber security and data protection are the first proactive steps to strengthening the security posture of any business. Organisations such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework 2.0 is an excellent resource that assists companies to achieve better security as it offers guidelines […]
Continue readingMore TagTag: Security
Artificial intelligence tools enhance application security
Unpacking some of the magic surrounding artificial intelligence and revealing what it can do to secure business applications. Artificial intelligence (AI) is not only the flavour of the month − it may well end up being the game-changer of the century. Having said this, information regarding it can be buried in jargon that conceals the […]
Continue readingMore TagGetting the best from an endpoint protection solution
An effective solution must enable a clear understanding of the security posture, where to invest, and how to improve and mitigate. The days of box-ticking security protection are over, as companies can no longer deploy solutions that merely satisfy audit or governance requirements. Cyber security is a serious business due to the relentless and rapid rate of […]
Continue readingMore TagReduce application security debt with AI, Veracode Fix
A recent study highlights the growth in security debt and reveals that finding and fixing flaws is becoming increasingly critical if potential costly hacks are to be avoided. For those unfamiliar with the term, let’s start by defining security debt. It is the accumulation of unfixed or unresolved security vulnerabilities, software that is out of date […]
Continue readingMore TagSquaring the software security circle
Veracode is using artificial intelligence to make applications more secure – at the speed of business. Two hacks over the last 12 months in South Africa – at the Companies and Intellectual Property Commission of South Africa (CIPC) and a famous retailer – illustrate yet again how urgent is the need for a multi-layered approach to security, […]
Continue readingMore TagEliminate the Security Chaos
CISOs and CIOs increasingly adopt information security management systems to improve their security posture and manage it going forward. A quick internet search on the current cyber threat landscape will yield any number of gloomy statistics. Add to that the fact that artificial intelligence (AI) is expected to give already well-resourced cyber criminals even more […]
Continue readingMore TagCyber resilience vital in threat-ridden business environment
According to Gartner, information is probably companies’ most valuable and lasting asset, with an ultimate value that is only limited by vision, or lack of same, for applying it. Information empowers smart decisions and fuels organisations’ growth strategies. In short, information has never been more important, nor has it ever been in greater danger. The […]
Continue readingMore TagMaximizing the Benefits of Cloud Migration with a Well-Tested Framework
Written by Reinier Van Dommelen, Principal Technical Consultant – Software Applications and Systems at iOCO In the global rush to go serverless and in the cloud, many organisations neglect quality assurance and testing – an oversight that can seriously impair performance and increase organisational risk. There are numerous reasons for this, but a key one […]
Continue readingMore TagSymantec Endpoint Security Adaptive Protection from CA Southern Africa
Enterprises across the globe are heavily invested in endpoint security to protect valuable assets. CA Southern Africa (CASA) reveals despite the time and money spent, more breaches are happening today than ever before. Why is that? “While the technology certainly has a role to play with some security solution offerings, lower protection levels and an […]
Continue readingMore TagRock-solid data resilience is the only option
Why backups, high availability and immutability should be the foundation of all companies’ cyber security strategy. Let’s kick off by answering the question – why should backup, high availability and immutability be the foundation of cyber security strategies? In a nutshell, because together they provide a rock-solid comprehensive cyber security strategy that delivers resilience against a […]
Continue readingMore Tag