Innovating your way to better cybersecurity

Issue 1 2022 Editor's Choice

The growth of the Digital Customer Experience has begun a revolution in the way organisations do business – most notably are the shifts to cloud and mobile technologies. These innovations are reportedly driving the modern business era, unfortunately they are also exposing new threats and security concerns for companies bent on transforming to digital platforms – a must if they are to remain competitive. Leading industry researchers and analysts are predicting a rapid growth trajectory for these market-disrupting technologies that will continue to increase the spotlight on gaps in cybersecurity, risk management and compliance.


Edison Mazibuko.

Industry reports prove the fragile state of cybersecurity:

• Cyberattacks occur more than 2,2 thousand times a day, with 71% of malware attempts being financially motivated.

• 80% of firms have seen an increase in cyberattacks this year.

• Approximately US$6 trillion was expected to be spent globally on cybersecurity last year.

The stats may seem incredible, but these latest trends are emerging alongside technologies including artificial intelligence and machine learning. The latest cybersecurity statistics confirm:

• Most cybersecurity breaches are caused by human error.

• Only 5% of the average company’s folders are protected.

• In 94% of cases, the malware reaches targets via email.

• Cybercrime costs organisations $2,9 million every minute.

• Due to Covid-19, cybercrime has risen by 600%.

• The average global cost of a data breach is $3,86 million.

This last figure is approximate because it can do nothing other than grow and most likely exponentially.

The cloud

The business world has moved on from should or how do I move to the cloud. Businesses debating the need to go to the cloud have quite possibly already found a spot on the ark carrying fax machines and videos. A move to the cloud is an essential element of implementing a digital transformation strategy that aims to grow a business.

KPMG confirms that the question today is more around the issue of, now that you are in the cloud, how do you ensure you have optimised your investment and risk exposure?

Emerging technologies driving cybersecurity innovation

The top five emerging technologies are well set out in this report. The following are said to be responsible for the cybersecurity industry’s production of innovative developments:

• AI and machine-learning – in the world of cybersecurity, both of these innovations are predominantly related to risk identification systems. Automation provides detection of cyber breaches and can also safeguard attack targets.

• Behavioural analytics – this has become an integral part of advanced cybersecurity solutions, constantly evolving to provide stronger protection. This technology allows all behavioural data to be stored and then processed to examine trends, patterns and habits in workflows.

• Blockchain can eliminate the authentication process as a potential attack spot because it can authenticate devices and users without the need for passwords. Moreover, each transaction is timestamped and digitally signed so it can’t be reversed or tampered with. Thanks to blockchain technology, cybersecurity promises a new dimension of conducting business transactions safely.

• Zero-trust – this model requires all users to be authenticated and authorised before accessing data and resources, even when they are inside the organisation’s enterprise network. This architecture takes nothing for granted.

• Hardware authentication is an innovative technology that generates unique and temporary cryptographic code for users to type in alongside passwords in order to gain access to stored data. This kind of approach relies on dedicated physical evidence for user authentication, combined with passwords.

So, to finish off where I started, as much as we hate cyberattacks, we must acknowledge that they never stop innovating. So how can we deal with these attacks if we are not striving to innovate? Today's digital world is comprised of cloud computing, mobile accessibility, big data, machine learning, artificial intelligence and more. Reactive strategies and solutions simply will not cut it when it comes to addressing new threats as and when they arise. It is essential for cybersecurity professionals to be innovative and to implement these innovations into practice as we increasingly move into a digitally enabled future.

Keeping up with the bad guys is not the name of the game. Rather, being 10 steps ahead of them with new technologies that aim to outwit; outpace and beat them at their own game.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
How AI video is reshaping real estate security
neaMetrics TRASSIR - neaMetrics Distribution Editor's Choice
Globally, property maintenance and facility operations spending is projected to grow to over US$145 billion by 2034, reflecting rising complexity, compliance pressures, and increased exposure to operational costs. AI systems can protect properties, automate access, and optimise building management.

Read more...
Open systems support hybrid surveillance
SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice
Today, end users can select the most suitable surveillance solution for their needs, whether it is on-site, at the edge, or in the cloud; a hybrid approach combining different options is most effective depending on the scenario.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.