The algorithm of trust

Issue 1 2025 Information Security, AI & Data Analytics


Richard-Frost.

AI security tools are moving beyond traditional signature-based approaches and can now identify subtle patterns in digital behaviours. These systems are capable of continuously learning from network traffic, users, systems, and applications to establish behavioural baselines. Then, when anomalies occur – like an employee suddenly accessing a database at unusual hours, irregular login patterns, or anomalous application behaviours – AI flags these deviations in real time.

Moreover, these solutions detect poor security behaviours and protect both businesses and users. An employee sending a spreadsheet of names and personal information to the wrong person or emails coming into the organisation from an unknown address are examples of situations that AI can detect quickly, alerting the relevant people to the potential risk. AI will alert the sender to the fact that the spreadsheet they have attached does not have any relevance to the content of the email. It will flag an email from an unknown address so that the user approaches it cautiously. In both instances, AI offers a rapid solution to a possible problem.

The solution is not invasive. It is an alert. It is a warning system that allows people to re-examine the content they send and receive and ensure they are not about to make an expensive mistake. The technology is designed to minimise the risk of identity fraud, phishing, and ransomware through intelligent detection and alerts.

Cyber-resilience

The World Economic Forum (WEF) defines cyber-resilience as an integral part of an organisation’s operations, culture and teams. The organisation’s Cyber Resilience Index revealed that 81% of companies were struggling to stay ahead of the threats and that 88% are worried about the resilience of the small to medium (SME) companies within their networks. As the ecosystems defined by the relationships between suppliers and enterprises become increasingly interconnected, cyber-resilience is falling behind and putting everyone at risk. The WEF also highlights the importance of leveraging AI and machine learning (ML) tools to help companies build this resilience and respond to threats more effectively.

Machine learning algorithms are then used to correlate seemingly unrelated events across multiple systems, identifying a potential attack chain that a human analyst may miss. For example, a combination of failed login attempts followed by a successful login from a new IP address alongside unusual system file activity could flag a compromise in progress. AI has the ability to adapt and refine its understanding of normal versus suspicious behaviours, making it increasingly difficult for bad actors to slip through the security nets.

Of course, threat actors are creating their own AI-powered solutions designed to combat the measures put in place by the business, but the tools used by security companies are catching them – and they are catching them quickly.

For example, a threat detected in Australia was remediated and protection released before South African companies came online. Active feeds monitored by AI were flagged, the solution developed, and systems updated at a speed that was unheard of in the past. This capability not only flags the value that AI provides in terms of how rapidly it can help companies and security organisations protect against attacks but also how it is always on and always vigilant. Humans need to sleep, AI does not. One of the biggest advantages offered by AI-empowered security systems is their ability to take global threats and provide local relevance.

While threat actors use AI to orchestrate increasingly sophisticated attacks, security solutions are doing the same – and in ingenious ways. Today, the organisation can thrive despite these threats because of the richness of AI-enhanced solutions. It is challenging to remain resilient with AI faking voices, interviews, and access, but resilience comes standard with the right tools and security partner.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Credential theft surges in South Africa
NEC XON Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.