The algorithm of trust

Issue 1 2025 Information Security, AI & Data Analytics


Richard-Frost.

AI security tools are moving beyond traditional signature-based approaches and can now identify subtle patterns in digital behaviours. These systems are capable of continuously learning from network traffic, users, systems, and applications to establish behavioural baselines. Then, when anomalies occur – like an employee suddenly accessing a database at unusual hours, irregular login patterns, or anomalous application behaviours – AI flags these deviations in real time.

Moreover, these solutions detect poor security behaviours and protect both businesses and users. An employee sending a spreadsheet of names and personal information to the wrong person or emails coming into the organisation from an unknown address are examples of situations that AI can detect quickly, alerting the relevant people to the potential risk. AI will alert the sender to the fact that the spreadsheet they have attached does not have any relevance to the content of the email. It will flag an email from an unknown address so that the user approaches it cautiously. In both instances, AI offers a rapid solution to a possible problem.

The solution is not invasive. It is an alert. It is a warning system that allows people to re-examine the content they send and receive and ensure they are not about to make an expensive mistake. The technology is designed to minimise the risk of identity fraud, phishing, and ransomware through intelligent detection and alerts.

Cyber-resilience

The World Economic Forum (WEF) defines cyber-resilience as an integral part of an organisation’s operations, culture and teams. The organisation’s Cyber Resilience Index revealed that 81% of companies were struggling to stay ahead of the threats and that 88% are worried about the resilience of the small to medium (SME) companies within their networks. As the ecosystems defined by the relationships between suppliers and enterprises become increasingly interconnected, cyber-resilience is falling behind and putting everyone at risk. The WEF also highlights the importance of leveraging AI and machine learning (ML) tools to help companies build this resilience and respond to threats more effectively.

Machine learning algorithms are then used to correlate seemingly unrelated events across multiple systems, identifying a potential attack chain that a human analyst may miss. For example, a combination of failed login attempts followed by a successful login from a new IP address alongside unusual system file activity could flag a compromise in progress. AI has the ability to adapt and refine its understanding of normal versus suspicious behaviours, making it increasingly difficult for bad actors to slip through the security nets.

Of course, threat actors are creating their own AI-powered solutions designed to combat the measures put in place by the business, but the tools used by security companies are catching them – and they are catching them quickly.

For example, a threat detected in Australia was remediated and protection released before South African companies came online. Active feeds monitored by AI were flagged, the solution developed, and systems updated at a speed that was unheard of in the past. This capability not only flags the value that AI provides in terms of how rapidly it can help companies and security organisations protect against attacks but also how it is always on and always vigilant. Humans need to sleep, AI does not. One of the biggest advantages offered by AI-empowered security systems is their ability to take global threats and provide local relevance.

While threat actors use AI to orchestrate increasingly sophisticated attacks, security solutions are doing the same – and in ingenious ways. Today, the organisation can thrive despite these threats because of the richness of AI-enhanced solutions. It is challenging to remain resilient with AI faking voices, interviews, and access, but resilience comes standard with the right tools and security partner.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...
Questing for the quantum AI advantage
Infrastructure AI & Data Analytics
The clock is ticking down to the realisation of quantum AI and the sought-after ‘quantum advantage’. In many boardrooms, however, quantum remains mysterious; full of promise, but not fully understood.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
IoT-driven smart data to stay ahead
IoT & Automation Infrastructure AI & Data Analytics
In a world where uncertainty is constant, the real competitive edge lies in foresight. Businesses that turn real-time data into proactive strategies will not just survive, they will lead.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
African industries may overestimate cyber defences
Information Security
] A significant perception gap exists in security awareness training: 68% of leaders believe training is tailored to roles, yet only a third of employees feel adequately trained. Many organisations only conduct annual or biannual generic training that may not effectively change behaviour.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.