The algorithm of trust

Issue 1 2025 Information Security, AI & Data Analytics


Richard-Frost.

AI security tools are moving beyond traditional signature-based approaches and can now identify subtle patterns in digital behaviours. These systems are capable of continuously learning from network traffic, users, systems, and applications to establish behavioural baselines. Then, when anomalies occur – like an employee suddenly accessing a database at unusual hours, irregular login patterns, or anomalous application behaviours – AI flags these deviations in real time.

Moreover, these solutions detect poor security behaviours and protect both businesses and users. An employee sending a spreadsheet of names and personal information to the wrong person or emails coming into the organisation from an unknown address are examples of situations that AI can detect quickly, alerting the relevant people to the potential risk. AI will alert the sender to the fact that the spreadsheet they have attached does not have any relevance to the content of the email. It will flag an email from an unknown address so that the user approaches it cautiously. In both instances, AI offers a rapid solution to a possible problem.

The solution is not invasive. It is an alert. It is a warning system that allows people to re-examine the content they send and receive and ensure they are not about to make an expensive mistake. The technology is designed to minimise the risk of identity fraud, phishing, and ransomware through intelligent detection and alerts.

Cyber-resilience

The World Economic Forum (WEF) defines cyber-resilience as an integral part of an organisation’s operations, culture and teams. The organisation’s Cyber Resilience Index revealed that 81% of companies were struggling to stay ahead of the threats and that 88% are worried about the resilience of the small to medium (SME) companies within their networks. As the ecosystems defined by the relationships between suppliers and enterprises become increasingly interconnected, cyber-resilience is falling behind and putting everyone at risk. The WEF also highlights the importance of leveraging AI and machine learning (ML) tools to help companies build this resilience and respond to threats more effectively.

Machine learning algorithms are then used to correlate seemingly unrelated events across multiple systems, identifying a potential attack chain that a human analyst may miss. For example, a combination of failed login attempts followed by a successful login from a new IP address alongside unusual system file activity could flag a compromise in progress. AI has the ability to adapt and refine its understanding of normal versus suspicious behaviours, making it increasingly difficult for bad actors to slip through the security nets.

Of course, threat actors are creating their own AI-powered solutions designed to combat the measures put in place by the business, but the tools used by security companies are catching them – and they are catching them quickly.

For example, a threat detected in Australia was remediated and protection released before South African companies came online. Active feeds monitored by AI were flagged, the solution developed, and systems updated at a speed that was unheard of in the past. This capability not only flags the value that AI provides in terms of how rapidly it can help companies and security organisations protect against attacks but also how it is always on and always vigilant. Humans need to sleep, AI does not. One of the biggest advantages offered by AI-empowered security systems is their ability to take global threats and provide local relevance.

While threat actors use AI to orchestrate increasingly sophisticated attacks, security solutions are doing the same – and in ingenious ways. Today, the organisation can thrive despite these threats because of the richness of AI-enhanced solutions. It is challenging to remain resilient with AI faking voices, interviews, and access, but resilience comes standard with the right tools and security partner.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
AI security with AI Cloud Protect
Information Security
AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zero impact on performance.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.