Innovating your way to better cybersecurity

Issue 1 2022 Editor's Choice

The growth of the Digital Customer Experience has begun a revolution in the way organisations do business – most notably are the shifts to cloud and mobile technologies. These innovations are reportedly driving the modern business era, unfortunately they are also exposing new threats and security concerns for companies bent on transforming to digital platforms – a must if they are to remain competitive. Leading industry researchers and analysts are predicting a rapid growth trajectory for these market-disrupting technologies that will continue to increase the spotlight on gaps in cybersecurity, risk management and compliance.

Edison Mazibuko.

Industry reports prove the fragile state of cybersecurity:

• Cyberattacks occur more than 2,2 thousand times a day, with 71% of malware attempts being financially motivated.

• 80% of firms have seen an increase in cyberattacks this year.

• Approximately US$6 trillion was expected to be spent globally on cybersecurity last year.

The stats may seem incredible, but these latest trends are emerging alongside technologies including artificial intelligence and machine learning. The latest cybersecurity statistics confirm:

• Most cybersecurity breaches are caused by human error.

• Only 5% of the average company’s folders are protected.

• In 94% of cases, the malware reaches targets via email.

• Cybercrime costs organisations $2,9 million every minute.

• Due to Covid-19, cybercrime has risen by 600%.

• The average global cost of a data breach is $3,86 million.

This last figure is approximate because it can do nothing other than grow and most likely exponentially.

The cloud

The business world has moved on from should or how do I move to the cloud. Businesses debating the need to go to the cloud have quite possibly already found a spot on the ark carrying fax machines and videos. A move to the cloud is an essential element of implementing a digital transformation strategy that aims to grow a business.

KPMG confirms that the question today is more around the issue of, now that you are in the cloud, how do you ensure you have optimised your investment and risk exposure?

Emerging technologies driving cybersecurity innovation

The top five emerging technologies are well set out in this report. The following are said to be responsible for the cybersecurity industry’s production of innovative developments:

• AI and machine-learning – in the world of cybersecurity, both of these innovations are predominantly related to risk identification systems. Automation provides detection of cyber breaches and can also safeguard attack targets.

• Behavioural analytics – this has become an integral part of advanced cybersecurity solutions, constantly evolving to provide stronger protection. This technology allows all behavioural data to be stored and then processed to examine trends, patterns and habits in workflows.

• Blockchain can eliminate the authentication process as a potential attack spot because it can authenticate devices and users without the need for passwords. Moreover, each transaction is timestamped and digitally signed so it can’t be reversed or tampered with. Thanks to blockchain technology, cybersecurity promises a new dimension of conducting business transactions safely.

• Zero-trust – this model requires all users to be authenticated and authorised before accessing data and resources, even when they are inside the organisation’s enterprise network. This architecture takes nothing for granted.

• Hardware authentication is an innovative technology that generates unique and temporary cryptographic code for users to type in alongside passwords in order to gain access to stored data. This kind of approach relies on dedicated physical evidence for user authentication, combined with passwords.

So, to finish off where I started, as much as we hate cyberattacks, we must acknowledge that they never stop innovating. So how can we deal with these attacks if we are not striving to innovate? Today's digital world is comprised of cloud computing, mobile accessibility, big data, machine learning, artificial intelligence and more. Reactive strategies and solutions simply will not cut it when it comes to addressing new threats as and when they arise. It is essential for cybersecurity professionals to be innovative and to implement these innovations into practice as we increasingly move into a digitally enabled future.

Keeping up with the bad guys is not the name of the game. Rather, being 10 steps ahead of them with new technologies that aim to outwit; outpace and beat them at their own game.

For more information contact DRS, +27 11 523 1600, [email protected],

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Migrating to mobile
Technews Publishing neaMetrics Suprema Editor's Choice
The ability to use mobile phones as access control credentials has been with us for a long time, yet only 32% of companies use them, and many only for specific use cases.

The problem with biometrics
Technews Publishing Editor's Choice Access Control & Identity Management Integrated Solutions
We have come to rely heavily on biometrics for many aspects of access and identity management, especially in identity management where selfie authentication is accepted with confidence. Are we doing it right? Roger Grimes has his own take on the matter.

AI presents people and companies with benefits and risks
Technews Publishing Editor's Choice
AI has changed and will still change the security landscape dramatically, but defenders and criminals can use its capabilities effectively.

Demystifying OSDP
Technews Publishing Editor's Choice
Open Supervised Device Protocol (OSDP) is more versatile and, importantly, a more secure protocol for access control systems than the old Wiegand installations the industry has adopted for decades.

A closed security concept for test halls and perimeter
Dallmeier Electronic Southern Africa Editor's Choice
At its factory facilities in Vilsbiburg, Germany, Flottweg SE relies on tailored video security technology from Dallmeier for perimeter security and workplace safety.

Advanced server performance and energy efficient design
Editor's Choice IT infrastructure Products
Dell PowerEdge server portfolio expansion offers more performance, including up to 2.9x greater AI inferencing while Dell Smart Flow design and Dell Power Manager software advancements deliver greater energy efficiency.

Free-to-use solar score for South African homes
Technews Publishing Editor's Choice
The LookSee Solar Score is one of the first of its kind to provide insight into the potential of solar power for South Africa’s residential properties.

Fast, reliable and secure cloud services
Technews Publishing Editor's Choice Cyber Security IT infrastructure
Security and speed are critical components of today’s cloud-based services infrastructure. Cloudflare offers a range of services supporting these goals beyond what most people think it does.

Fire-fighting force at Vergelegen
Editor's Choice Fire & Safety Residential Estate (Industry)
Vergelegen wine estate in Somerset West, and its neighbours, are set to enjoy greater peace of mind this summer, thanks to the delivery of a brand new fire truck .

Sasol ensures Zero Trust for SAP financials with bioLock
Technews Publishing Editor's Choice Cyber Security Security Services & Risk Management
Multi-factor authentication, including biometrics, for SAP Financials from realtime North America prevents financial compliance avoidance for Sasol.