Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Voice going the way of SMS, says Vodacom CEO Shameel Joosub

      Voice is going the way of SMS, says Vodacom CEO

      11 May 2026
      Pressure builds on Vodacom's South African mobile business - Shameel Joosub

      Pressure builds on Vodacom’s South African mobile business

      11 May 2026
      Eskom battles widespread outages as storm batters the Cape

      Eskom battles widespread outages as storm batters the Cape

      11 May 2026
      Vodacom's fintech machine tops 100 million customers

      Vodacom’s fintech machine tops 100 million customers

      11 May 2026
      Naspers unit offloads stake in food giant for R6.5-billion - Prosus

      Naspers unit offloads stake in food giant for R6.5-billion

      11 May 2026
    • World
      Pop star sues Samsung for $15-million - Dua Lipa

      Pop star sues Samsung for $15-million

      11 May 2026
      OpenAI's new audio APIs aim for conversational voice agents

      OpenAI’s new audio APIs aim for conversational voice agents

      8 May 2026
      'It was my idea': Musk claims paternity of OpenAI - Elon Musk

      ‘It was my idea’: Musk claims paternity of OpenAI

      29 April 2026
      Pivotal week for US tech stocks

      Pivotal week for US tech stocks

      28 April 2026
      Worries over OpenAI's growth as Anthropic gains ground - Sam Altman. Shelby Tauber/Reuters

      Worries over OpenAI’s growth as Anthropic gains ground

      28 April 2026
    • In-depth
      Alfa's electric rebel - Alfa Romeo Junior Elettrica Veloce

      Alfa’s electric rebel

      29 April 2026
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      Datatec is firing on all cylinders - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
    • TCS
      Michael Rossouw

      TCS+ | The retirement decision most South Africans get wrong

      6 May 2026
      TCS | The Cape Town start-up listening for TB with AI - Braden van Breda

      TCS | The Cape Town start-up listening for TB with AI

      4 May 2026

      TCS+ | ‘The ISP for ISPs’: Vox’s shift to wholesale aggregator

      20 April 2026
      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      15 April 2026
      TCS | Donovan Marsh on AI and the future of filmmaking

      TCS | Donovan Marsh on AI and the future of filmmaking

      7 April 2026
    • Opinion
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Free calls, dead voice and Shameel Joosub’s Spanish ghost

      22 April 2026
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      R230-million in the bag for Endeavor's third Harvest Fund - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • Contactable
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » How to mature your cybersecurity programme

    How to mature your cybersecurity programme

    By Gidi Cohen13 May 2021
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Security leaders have long wanted to tackle their most pervasive issues. These include exponential growth of the attack surface and cyber risks as well as diminishing control of a rapidly changing technology landscape — all against the backdrop of a severe talent shortage.

    Skybox’s new report, Vulnerability and threat trends 2021: Cybersecurity comes of age, demonstrates that there is a need for greater maturity. It brings focus to just how energised threat actors have become over the pandemic: Extraordinarily, new malware samples almost doubled over 2020. It highlights how operational technology (OT) environments are increasingly exposed to attack: The number of vulnerabilities within industrial Internet of things (IIoT) devices increased by 308% over the last year. And it reinforces the scale of the task now facing teams dealing with cyber-risk management: There were 18 341 new vulnerabilities over 2020, adding to the exposure from prior years’ discoveries.

    What has become clear over the last year is that what was once considered “good enough” will no longer suffice. Long-held practices relying primarily on detection and response don’t hold water anymore — if we are honest with ourselves, they were never “good enough”.

    What has become clear over the last year is that what was once considered ‘good enough’ will no longer suffice

    Managing security posture has become a critical necessity for reducing the risk of cyberattacks. By improving security posture, it’s possible to eliminate the exploitation of known attack vectors. Further, by focusing on a much smaller attack surface, detection and response programmes can shine again.

    But security posture management is not an easy task. Organisations have a complex security stack and use many technologies. As a result, they are discovering that their muscle to manage security posture is, at best, underdeveloped. They need to adopt a transformation mindset. To achieve this, organizations need to mature their security programmes:

    Gidi Cohen

    Develop a roadmap to maturity

    Developing a well-rounded and resilient cybersecurity programme isn’t something that can happen overnight. It’s a journey that demands iterative change. The first step of this journey is understanding your organisation’s current maturity level. It could be that you are addressing security on an ad hoc basis, or you may have defined security processes, or you may be at a stage where you can manage your programme and are able to drive strategic change. By understanding what the next level of maturity looks like, you can develop a road map that will improve your security posture.

    Ad hoc

    This stage represents the most remedial cybersecurity programmes. These can be found in organisations that don’t have consistent processes or policies. An “ad hoc” programme is one without systems or tools in place. As a result, there are functional and technological silos; the programme is reactive and piecemeal; blind decisions are made that are based on a patchwork of data inputs; and remediation and patching are typically news-driven and happen sporadically.

    Developing

    One step above ad hoc security, this stage is where you will find organisations that have an active cybersecurity programme but lack defined processes. For example, they may have a vulnerability scanner but they aren’t using it systematically. Security is something that’s dealt with inconsistently, with periodic clean-ups of rules and objects, hardening of configurations, and patching to eliminate vulnerabilities. Additionally, compliance is handled with manual checking and recertification.

    Defined

    Some organisations are at the stage where they have a defined programme. They know who is responsible for each task and are clear about processes. However, they still don’t know what’s happening every day. They may have policies in place, but they don’t have any ongoing tools to manage them properly. And they may have a defined vulnerability management programme, but they cannot automate remediation and have inconsistent oversight of operational performance and risk level.

    Managed

    Organisations with well-established and mature cybersecurity programmes sit here. They have dashboards that enable them to manage their programme, they can see whether they’re making improvements, and they have insight that enables them to make strategic changes to their programmes. And they will be automating change management as well as the discovery, prioritisation and remediation of vulnerabilities.

    Optimising

    Very few organizations are currently at this stage – in many ways, this is an aspiration for most organisations. But getting to the stage where you can focus on optimising processes and delivering ongoing, continuous improvement for the organisation is achievable. This is when organisations have holistic visibility of the attack surface and can visualise, analyse, and narrow it down on an ongoing basis. They have tight integration with the security and IT management ecosystem. They have a common platform and data sets for all teams dealing with security posture management and incident response. And they can leverage context of their environment to zero in on what matters and remediate their most exposed vulnerabilities first.

    Zero in on what matters

    By maturing cybersecurity programmes beyond traditional defence tactics, the chief information security officer will be able to gain the insight needed to improve security posture. By understanding the context of the infrastructure and its security controls — on-prem, private cloud and public cloud, and achieving full visibility of their attack surface, they will be able to better quantify cyber risks, prioritise remediation and zero in on what matters.

    Skybox’s new report highlights the biggest challenges facing CISOs and their teams today. But it also explains why this is a pivotal moment for cybersecurity. We are at the beginning of an exciting new era. This is the moment when cybersecurity comes of age to help security teams zero in on what matters and overcome some of their largest and most enduring challenges.

    Read the report now

    Additional resources

    • Vulnerability and threat trends 2021: Cybersecurity comes of age
    • E-book: Risk-based vulnerability management

    About Gidi Cohen
    Gidi Cohen co-founded Skybox in 2002 and has guided the company’s vision and development as the leader in cybersecurity analytics. A respected innovator in the security analytics space, he is a popular speaker at industry conferences worldwide, demonstrating how sophisticated analytics, modelling and simulation, as well as unprecedented network visibility, are used to reduce an enterprise’s attack surface. For more than 10 years he has been committed to empowering security leaders to quickly and accurately prioritise and address vulnerabilities and threats with cutting-edge Skybox solutions.

    About Skybox Security
    Over 500 of the largest and most security-conscious enterprises in the world rely on Skybox for the insights and assurance required to stay ahead of dynamically changing attack surfaces. Our Security Posture Management Platform delivers complete visibility, analytics and automation to quickly map, prioritise and remediate vulnerabilities across your organisation. The vendor-agnostic solution intelligently optimises security policies, actions and change processes across all corporate networks and cloud environments. With Skybox, security teams can now focus on the most strategic business initiatives while ensuring enterprises remain protected. Visit www.skyboxsecurity.com for more information.

    • Check out all the recent Skybox Security content on hub.techcentral.co.za/skybox
    • This promoted content was paid for by the party concerned
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Gidi Cohen Skybox Skybox Security
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleSABC tells television viewers: Analogue switch-off is coming
    Next Article Elon Musk single-handedly crashes bitcoin

    Related Posts

    4 tips for exposure management of your business applications - Skybox Security

    4 tips for exposure management of your business applications

    19 February 2025
    Network professionals lose nearly half their week to manual tasks that could be automated - Skybox Security report

    Network professionals lose nearly half their week to manual tasks that could be automated

    3 December 2024

    Skybox: half of firms fear security incidents due to siloed network and security teams

    17 October 2024
    Company News
    Where AI actually belongs in enterprise systems - BBD Software Development

    Where AI actually belongs in enterprise systems

    11 May 2026
    Your databases are being watched - just not by you - Ascent Technology Johan Lambert

    Your databases are being watched – just not by you

    8 May 2026
    Hexion deploys 30 petabyte sovereign data archive in South Africa

    Hexion deploys 30 petabyte sovereign data archive in South Africa

    7 May 2026
    Opinion
    Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

    Free calls, dead voice and Shameel Joosub’s Spanish ghost

    22 April 2026
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Voice going the way of SMS, says Vodacom CEO Shameel Joosub

    Voice is going the way of SMS, says Vodacom CEO

    11 May 2026
    Pressure builds on Vodacom's South African mobile business - Shameel Joosub

    Pressure builds on Vodacom’s South African mobile business

    11 May 2026
    Eskom battles widespread outages as storm batters the Cape

    Eskom battles widespread outages as storm batters the Cape

    11 May 2026
    Vodacom's fintech machine tops 100 million customers

    Vodacom’s fintech machine tops 100 million customers

    11 May 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}