Check Point dissects the complexities of cloud security

Loading player...
Promoted | Check Point’s Rudi van Rooyen explains why cloud security is not as straightforward as organisations might assume.
The software security landscape is in a constant state of flux.
According to research undertaken by Check Point Software Technologies – an AI-powered, cloud-delivered cybersecurity platform provider protecting over 100 000 organisations worldwide – African organisations have been attacked on average 2 508 times a week in the last six months. This compares to 1 379 per organisation globally.
Some 70% of malicious files impacting African organisations were delivered via e-mail in the last 30 days, while the most common vulnerability exploit type is “information disclosure”, impacting 75% of organisations.
The race is therefore on between threat actors looking to exploit organisations and cybersecurity experts who protect sensitive organisational data.
In this episode of TCS+, Rudi van Rooyen, security engineer at Check Point Software Africa, offers a deep dive into the ins and outs of software system security for organisations of any size.
Van Rooyen unpacks:
• Why cloud migration is not a cure-all for software security issues in an organisation, and how security in a cloud setting should be approached.
• How Check Point manages to maintain a prevention-first approach to cybersecurity despite new types of attacks being developed daily.
• How AI is helping the chief information security officer cope with skills shortages and overwork by simplifying security operations.
• How Check Point’s virtual CISO function assists security leads in addressing their cybersecurity concerns.
• Insights into how much cybercrime impacts the South African economy.
• What Check Point recommends organisations do to better protect themselves against cybercriminals.
Insightful, important and sometimes technical, this discussion is critical for any information security expert or business owner looking to better protect their enterprise against cyber threats.
11 Jun 2024 English South Africa Technology · Business

Other recent episodes

Cassava’s Adil El Youssefi on data centre growth in Africa

In this episode of TCS+, Adil El Youssefi, newly appointed CEO of the colocation business at Cassava Technologies and CEO of Africa Data Centres, chats about the challenges and opportunities in sub-Saharan Africa. El Youssefi delves into: • His background prior to being appointed into the role and how it…
13 Aug 30 min

Zahir Cajee on Samsung’s new Galaxy Z Fold7, Flip7 and Watch8 line-up

Folding phones are advancing at light speed. For consumers, the appeal is self-evident: on one hand, folding phones give them the option to have a larger, tablet-like interface that offers enhanced productivity and a better user experience. On the other hand, the fit-in-your-pocket design when folded maintains easy portability. Samsung…
31 Jul 18 min

Lessons from South Africa’s biggest cyberattacks

IT security breaches are on the rise in South Africa and worldwide, and with AI tools at their disposal, criminals are scaling up their attacks. With the risk of attack so high, organisations are forced to look beyond beefing up security – they must prepare for the unfortunate event where…
25 Jul 15 min

First Distribution’s guide to a bulletproof cyber crisis response strategy

In cybersecurity, prevention is always better than cure. However, organisations have to prepare for the worst-case scenario, one where their systems are breached by cybercriminals. This is the second in a series of three podcasts on how to manage cyber crises effectively when they happen. The first episode – watch…
24 Jul 11 min

How cyberthreats turn into cyber crises

In today's hyperconnected society, a cybersecurity crisis isn’t just a technical glitch; it's a profound disruption that can bring businesses, governments and even entire countries to a halt. For organisations to protect themselves effectively, they must understand what cybercriminals are capable of, where the vulnerabilities in their own systems are…
23 Jul 13 min