CA Southern Africa

Tel: +27 11 417 8594
Fax: +27 11 417 8691
Email: [email protected]
www: www.ca.com/za
more information about CA Southern Africa

Secure by default
Issue 7 2020, Axis Communications SA, Editor's Choice
A Secure by Default strategy means taking an holistic approach to solving security problems at the root cause, rather than treating the symptoms of a cybersecurity defect.

Read more...
Cybersecurity comment: Cyber threats remain relentless
Issue 5 2020, Cyber Security
Over 80% of email-based threats in Q1 2020 leverage COVID-19 in some form to feign legitimacy to the end user.

Read more...
Four financial risks for the future
Issue 3 2020, Editor's Choice
Gregory Dellas, security presales consultant at CA Southern Africa, highlights four areas of cyber-risk the financial industry will face in 2020 onwards.

Read more...
IoT and behavioural authentication
Access & Identity Management Handbook 2020, Access Control & Identity Management
IoT represents an increasing security risk to individuals in the form of pervasive, always-on monitoring of your personal activity with a potential compromise of your most personal security credentials.

Read more...
Managing the insider threat
Access & Identity Management Handbook 2020, Access Control & Identity Management
Gerard King discusses best practices for the management of privileged users in the mainframe environment in a world where the insider threat is always growing.

Read more...
New appointments at CA Southern Africa
October 2019, News
CA Southern Africa has announced a number of senior appointments to strengthen its local team.

Read more...
Protecting people’s money, and their data
May 2019, Cathexis Technologies, IDEMIA , Editor's Choice, Integrated Solutions, Financial (Industry)
The temptations inherent to the banking sector, and financial institutions more generally, pit them in an eternal and increasingly high-tech battle to secure themselves against threats from within and without.

Read more...
Significant differences in ­perceptions on state of digital trust
Access & Identity Management Handbook 2019, Access Control & Identity Management, Security Services & Risk Management
Nearly half of businesses admit to selling customer data, despite claiming data ­protection as paramount; consumer behaviour shows strong correlation between loss of business and lack of digital trust.

Read more...
IoT needs access management
October 2018, Editor's Choice, IT infrastructure, Security Services & Risk Management
Sagan Pillay, CA Southern Africa security solution strategist, highlights the security risks associated with the growth of the Internet of Things.

Read more...
Cyber complacency is real
April 2018, Editor's Choice, Cyber Security
New report from CA Veracode reveals business leaders only address cybersecurity under duress.

Read more...
Cyberattacks will not go away
February 2018, Cyber Security, IT infrastructure
Cybercrime will continue to grow – the issue for businesses is to determine “do the right people have access to the data they are entitled to access”?

Read more...
Awareness and trust in context
Access & Identity Management Handbook 2018, Access Control & Identity Management, Security Services & Risk Management
Markus Krauss, senior director, Digital Identity and Security, CA Technologies, spoke to Hi-Tech Security Solutions about making identity work for people and things.

Read more...

      Page 1 of 3   Next >   Last >>