The algorithm of trust

Issue 1 2025 Information Security, AI & Data Analytics


Richard-Frost.

AI security tools are moving beyond traditional signature-based approaches and can now identify subtle patterns in digital behaviours. These systems are capable of continuously learning from network traffic, users, systems, and applications to establish behavioural baselines. Then, when anomalies occur – like an employee suddenly accessing a database at unusual hours, irregular login patterns, or anomalous application behaviours – AI flags these deviations in real time.

Moreover, these solutions detect poor security behaviours and protect both businesses and users. An employee sending a spreadsheet of names and personal information to the wrong person or emails coming into the organisation from an unknown address are examples of situations that AI can detect quickly, alerting the relevant people to the potential risk. AI will alert the sender to the fact that the spreadsheet they have attached does not have any relevance to the content of the email. It will flag an email from an unknown address so that the user approaches it cautiously. In both instances, AI offers a rapid solution to a possible problem.

The solution is not invasive. It is an alert. It is a warning system that allows people to re-examine the content they send and receive and ensure they are not about to make an expensive mistake. The technology is designed to minimise the risk of identity fraud, phishing, and ransomware through intelligent detection and alerts.

Cyber-resilience

The World Economic Forum (WEF) defines cyber-resilience as an integral part of an organisation’s operations, culture and teams. The organisation’s Cyber Resilience Index revealed that 81% of companies were struggling to stay ahead of the threats and that 88% are worried about the resilience of the small to medium (SME) companies within their networks. As the ecosystems defined by the relationships between suppliers and enterprises become increasingly interconnected, cyber-resilience is falling behind and putting everyone at risk. The WEF also highlights the importance of leveraging AI and machine learning (ML) tools to help companies build this resilience and respond to threats more effectively.

Machine learning algorithms are then used to correlate seemingly unrelated events across multiple systems, identifying a potential attack chain that a human analyst may miss. For example, a combination of failed login attempts followed by a successful login from a new IP address alongside unusual system file activity could flag a compromise in progress. AI has the ability to adapt and refine its understanding of normal versus suspicious behaviours, making it increasingly difficult for bad actors to slip through the security nets.

Of course, threat actors are creating their own AI-powered solutions designed to combat the measures put in place by the business, but the tools used by security companies are catching them – and they are catching them quickly.

For example, a threat detected in Australia was remediated and protection released before South African companies came online. Active feeds monitored by AI were flagged, the solution developed, and systems updated at a speed that was unheard of in the past. This capability not only flags the value that AI provides in terms of how rapidly it can help companies and security organisations protect against attacks but also how it is always on and always vigilant. Humans need to sleep, AI does not. One of the biggest advantages offered by AI-empowered security systems is their ability to take global threats and provide local relevance.

While threat actors use AI to orchestrate increasingly sophisticated attacks, security solutions are doing the same – and in ingenious ways. Today, the organisation can thrive despite these threats because of the richness of AI-enhanced solutions. It is challenging to remain resilient with AI faking voices, interviews, and access, but resilience comes standard with the right tools and security partner.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Top five AIoT trends in 2026
IoT & Automation AI & Data Analytics
As we enter 2026, the convergence of artificial intelligence (AI) and IoT infrastructure is reshaping industries, unlocking unprecedented opportunities to optimise operations, enhance security, and improve sustainability.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...
Banking’s AI reckoning
Financial (Industry) News & Events AI & Data Analytics
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Eight African cybersecurity trends for 2026
Information Security
Check Point Software Technologies has released eight critical trends shaping Africa’s digital turning point in 2026, noting that their implementation will require the government, the private sector, and key civic institutions to cooperate.

Read more...
Securing a South African healthcare network
Surveillance Healthcare (Industry) AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance.

Read more...
DeepAlert appoints Howard Harrison as CEO
DeepAlert News & Events AI & Data Analytics
DeepAlert has appointed Howard Harrison as chief executive officer. DeepAlert’s founder and CEO of the past six years, Dr Jasper Horrell, will transition into a newly created role as chief innovation officer.

Read more...
The year of the agent
Information Security AI & Data Analytics
The dominant attack patterns in Q4 2025 included system-prompt extraction attempts, subtle content-safety bypasses, and exploratory probing. Indirect attacks required fewer attempts than direct injections, making untrusted external sources a primary risk vector heading into 2026.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.