Bringing you the lastest news from our Solutions

Linden Pieterse Linden Pieterse

Building the Foundation for Effective Security and IT Operations – XM Cyber and ServiceNow

XM Cyber and ServiceNow are coming together to integrate the leading continuous exposure management platform with the leading workflow automation platform. We’re excited about this collaboration that gives organizations the ability to build and support more efficient remediation programs. In this blog, we’ll discuss how IT and Security leaders can more effectively mobilize their teams, align resources, and deliver better business outcomes with these new integrations. 

Read More
Linden Pieterse Linden Pieterse

Building Saviynt Intelligence: the World’s Best Access Recommendation Engine

On September 10, Saviynt announced Saviynt Intelligence, a new suite of capabilities bringing additional insights and clarity for identity security. Intelligent Recommendations is the first offering introduced under the Saviynt Intelligence umbrella and is not simply an incremental improvement in existing Saviynt Identity Cloud features, but a radical reimagining of how Identity Governance and Administration (IGA) is achieved.

Read More
Linden Pieterse Linden Pieterse

Automate to Elevate Your Cybersecurity

How Smart Automation is Redefining Risk Management. In today's rapidly evolving threat landscape, cybersecurity teams are under immense pressure to protect their organisations from a constant barrage of attacks. The sheer volume of vulnerabilities, coupled with the increasing sophistication of cybercriminals, makes it challenging to maintain a strong security posture.

Read More
Linden Pieterse Linden Pieterse

Comprehensive Security Made Simple

How MSPs Can Deliver Multi-Layered Protection to SMBs. Holistic, hassle-free security solution empowering MSPs to offer SMBs streamlined security solutions.

Read More
Linden Pieterse Linden Pieterse

5 CTEM Myths – Debunked!

Continuous Threat Exposure Management framework (CTEM) is an increasingly popular proactive cybersecurity approach. CTEM’s power lies in its construct, which enables a continual assessment of how and if an organization might be impacted by cyberattacks. 

Read More
Linden Pieterse Linden Pieterse

Supply Chain Attacks Start with your 3rd Party Providers

How well do you know your 3rd party service providers and their level of commitment to information security controls and procedures? What do you know about their service providers? For most companies, the answer is “not much”, yes virtually all organizations provide access to those “unknowns” into their network and applications to get the job done. Securing this supply chain has always been a headache for companies and several solutions are commonly used to balance between security and “getting things done”.

Read More
Linden Pieterse Linden Pieterse

Why Tokenization Beats Transparent Data Encryption for PCI DSS Compliance

comforte's data-centric security platform discovers sensitive data elements and replaces them with non-sensitive placeholders meaningless to attackers while preserving their utility for processing and analytics. Their solutions help organizations mitigate the risks of data breaches, enable secure data utilization across business applications, and reduce the complexity of compliance with stringent regulations such as PCI DSS or GDPR.

Read More
Linden Pieterse Linden Pieterse

Skybox Deployment with a large Telco in South Africa: A Seamless Integration Thanks to Exceptional Collaboration with Performanta, and Solid8 Technologies

The deployment of Skybox Security at a large telco has been an exemplary model of seamless integration and effective collaboration. With such exceptional internal customer support and a strong working relationship between teams, the project will deliver rapid ROI and immense value to addressing their business and technical needs.

Read More
Linden Pieterse Linden Pieterse

Amid Warren Buffet’s Dire Warning: Why Cyber Insurance is Crucial for SMBs

Cyber Threats on the Rise: Small and medium businesses, are increasingly targeted by cyberattacks, making cyber insurance essential.

Widespread Underinsurance: Despite the rising risks, many SMBs remain underinsured or not insured at all against cyber threats.

Guardz’s Pioneering Solution: Guardz has launched a new offering to help secure and insure small & medium businesses against growing cybersecurity threats, making insurance accessible to previously ineligible companies.

Read More
Linden Pieterse Linden Pieterse

Why Data-Centric Security Is a Critical Foundation for AI-Powered Analytics

Data analytics have been used for decades to enhance business insight and drive efficiency, growth and innovation. But the addition of intelligent algorithms and cloud computing power offers potentially game-changing opportunities to push these benefits even further. The challenge, as ever, is to ensure the underlying data itself is kept as secure as possible. If not, business leaders may lose confidence in its accuracy and expose their organization to significant financial, reputational and compliance risk.

Read More