SA enterprises can benefit from AI-driven cybersecurity

Issue 7 2023 AI & Data Analytics, Information Security


Steven Kenny.

South Africa leads the rest of Africa when it comes to cybercrime. In 2022, 230 million threats were detected in the country, surpassing Morocco in second place with 71 million. South Africa also had the highest targeted ransomware and business email compromise attempts and is home to the third-highest number of cybercrime victims worldwide at an annual cost of R2,2 billion.

Cybercrime is big business, and threat actors are deploying cutting-edge tools to carry out their attacks. Fortunately, cybersecurity is constantly evolving to meet the ever-changing needs of individuals and organisations, and to counter the threats they face.

Enterprises have access to and leverage cutting-edge solutions to reinforce their security resilience. Artificial intelligence (AI), something that is influencing all spheres of business activity, can help secure enterprises’ growing attack surface area and identify and mitigate vulnerabilities without the need for additional human intervention. As with any business change, part of deploying AI-driven solutions is having a robust strategy in place, one that considers the long-term feasibility and requirements of those solutions.

Threats of escalating severity

For many threat actors, cybercrime is a business like any other. As a result, they are inclined to adopt the latest trends and use the latest technologies to carry out their attacks. The various features of AI and machine learning (ML) that enterprises are starting to explore are the same features criminals are misusing.

There are several examples of this. For instance, generative AI tools such as ChatGPT and Google’s Bard can provide criminals with marketing messages for phishing emails. AI automation tools can create automated interactions with a large pool of potential victims. Algorithms trained on personal data can be used to build profiles of victims and prioritised lists, minimising the resources needed while increasing the accuracy of attacks.

The misuse of AI goes beyond straightforward phishing attempts using ChatGPT. AI-powered malware can leverage advanced techniques to evade detection by security software and use metamorphic mechanisms to change operations based on their environment. Consider DeepLocker, an AI-powered malware developed by IBM research as an experiment. It conceals its intent until it reaches a specific victim, potentially infecting millions of systems without detection. It is critical that enterprises stay one step ahead of malicious innovation like this, and they can do this by properly integrating AI-powered systems and countermeasures into their security strategies.

First responders

Having AI-enabled security systems requires an overhaul of organisations’ inner security workings. In other words, given the technological, legal, and ethical implications of those systems, companies need to provide adequate training and education for their security teams and conduct due diligence with their respective IT suppliers and partners.

From there, the critical factor is data. AI programs can identify patterns, detect anomalies, and analyse vast amounts of data throughout an organisation’s network and infrastructure. This applies to infrastructure regardless of its scope and circumstance. Case in point: AI can detect vulnerability in hybrid or remote environments where systems are decentralised. These programmes serve as the ‘first responders’ in countering any malicious activity, and they help organisations assume a more proactive, forward-looking risk posture.

AI is also a force for reducing organisations’ security workloads. For example, AI-powered automated patching can track and patch important software in real time and minimise potential exposure to threat actors. Remember that businesses should not become over-reliant on these systems or leave them susceptible to data breaches. Organisations must implement solid policies and guidelines regarding data access, monitoring, and analytics to avoid this.

We need to embrace the future

According to Microsoft-IDC research, 39% of companies in South Africa plan to address security concerns by improving the automation of processes and integration of their technologies. This is a step in the right direction, but it is only the beginning for many organisations and their efforts to overhaul their security setups.

AI represents a turning point in how we approach security, among many other business functions. Its implementation may come with unanticipated consequences, but organisations must be prepared to adopt it, lest they fall behind their competitors or only see its value too far down the road.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...
Questing for the quantum AI advantage
Infrastructure AI & Data Analytics
The clock is ticking down to the realisation of quantum AI and the sought-after ‘quantum advantage’. In many boardrooms, however, quantum remains mysterious; full of promise, but not fully understood.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
IoT-driven smart data to stay ahead
IoT & Automation Infrastructure AI & Data Analytics
In a world where uncertainty is constant, the real competitive edge lies in foresight. Businesses that turn real-time data into proactive strategies will not just survive, they will lead.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
SA businesses embrace GenAI, but strategy and skills lag
News & Events AI & Data Analytics
South African enterprises are rapidly integrating Generative AI (GenAI) into their operations, but most are doing so without formal strategies, dedicated leadership, or the infrastructure required to maximise value and minimise risk.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.