Check Point dissects the complexities of cloud security

Loading player...
Promoted | Check Point’s Rudi van Rooyen explains why cloud security is not as straightforward as organisations might assume.
The software security landscape is in a constant state of flux.
According to research undertaken by Check Point Software Technologies – an AI-powered, cloud-delivered cybersecurity platform provider protecting over 100 000 organisations worldwide – African organisations have been attacked on average 2 508 times a week in the last six months. This compares to 1 379 per organisation globally.
Some 70% of malicious files impacting African organisations were delivered via e-mail in the last 30 days, while the most common vulnerability exploit type is “information disclosure”, impacting 75% of organisations.
The race is therefore on between threat actors looking to exploit organisations and cybersecurity experts who protect sensitive organisational data.
In this episode of TCS+, Rudi van Rooyen, security engineer at Check Point Software Africa, offers a deep dive into the ins and outs of software system security for organisations of any size.
Van Rooyen unpacks:
• Why cloud migration is not a cure-all for software security issues in an organisation, and how security in a cloud setting should be approached.
• How Check Point manages to maintain a prevention-first approach to cybersecurity despite new types of attacks being developed daily.
• How AI is helping the chief information security officer cope with skills shortages and overwork by simplifying security operations.
• How Check Point’s virtual CISO function assists security leads in addressing their cybersecurity concerns.
• Insights into how much cybercrime impacts the South African economy.
• What Check Point recommends organisations do to better protect themselves against cybercriminals.
Insightful, important and sometimes technical, this discussion is critical for any information security expert or business owner looking to better protect their enterprise against cyber threats.
11 Jun 2024 English South Africa Technology · Business

Other recent episodes

Managing Sims, saving money: how MSB Micro keeps businesses connected

In today’s hyperconnected society, mobile connectivity is key to running a successful business, helping keep employees connected to each other, to organisational resources and to customers. To manage communications effectively, businesses need to have a clear view of the entire Sim estate across the organisation. Monitoring usage and having the…
22 Oct 12 min

Cloud On Demand's Senzo Mbhele on the benefits of the AWS distribution model

When most people think of Amazon Web Services, they automatically assume they should go directly to AWS. However, for the diverse ecosystem of AWS partners – including managed service providers and independent software vendors – the real secret to achieving significant growth often lies in leveraging the distributor model. Consider…
10 Oct 51 min

LSD Open: why repatriating from the cloud can be a costly mistake

Not every organisation that has migrated to the cloud has reaped the rewards promised in terms of faster development and deployment cycles, simplified infrastructure management, and most importantly, a reduction in costs. Some are going as far as repatriating their infrastructure back into on-premises environments, perhaps because they understand it…
23 Sep 21 min

Arctic Wolf on cybersecurity in the age of AI

What does it really take to defend a business in an era of AI-driven attacks? In this episode of TechCentral’s TCS+ ,Clare Loveridge, vice president and GM for Europe, Middle East and Africa (Emea), and Johnny Ellis, senior director of Emea channel sales, both at Arctic Wolf, go beyond the…
25 Aug 33 min