Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Sanlam appoints group chief AI officer - Theo Mabaso

      Sanlam appoints group chief AI officer

      24 March 2026
      SA's digital economy is booming - but so is the fraud that comes with it - Nomvuyiso Batyi

      SA’s digital economy is booming – but so is the fraud that comes with it

      24 March 2026
      Oracle is rebuilding its software empire around AI agents

      Oracle is rebuilding its software empire around AI agents

      24 March 2026
      AWS again impacted by drone attacks in Middle East

      AWS again disrupted by drone attacks in Middle East

      24 March 2026
      Namibia rejects Starlink

      Namibia rejects Starlink

      24 March 2026
    • World
      It's official: ads are coming to ChatGPT

      It’s official: ads are coming to ChatGPT

      23 March 2026
      Mystery Chinese AI model revealed to be Xiaomi's

      Mystery Chinese AI model revealed to be Xiaomi’s

      19 March 2026
      A mystery AI model has developers buzzing

      A mystery AI model has developers buzzing

      18 March 2026
      Samsung's trifold gamble ends in retreat

      Samsung’s trifold gamble ends in retreat

      17 March 2026
      Nvidia targets $1-trillion in AI chip sales as inference demand surges - Jensen Huang

      Nvidia targets $1-trillion in AI chip sales as inference demand surges

      17 March 2026
    • In-depth
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
    • TCS
      Meet the CIO | HealthBridge CTO Anton Fatti on the future of digital health

      Meet the CIO | Healthbridge CTO Anton Fatti on the future of digital health

      23 March 2026
      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses - Clare Loveridge and Jason Oehley

      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses

      19 March 2026
      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience - Theo van Zyl

      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience

      13 March 2026
      TCS+ | Flipping the narrative on AI in the Global South - Josefin Rosén

      TCS+ | Flipping the narrative on AI in the Global South

      13 March 2026
      TCS | Sink or swim? Antony Makins on how AI is rewriting the rules of work

      TCS | Sink or swim? Antony Makins on how AI is rewriting the rules of work

      5 March 2026
    • Opinion
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
      The AI fraud crisis your bank is not ready for - Andries Maritz

      The AI fraud crisis your bank is not ready for

      18 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » Unpacking South Africa’s data and cybersecurity challenges

    Unpacking South Africa’s data and cybersecurity challenges

    Promoted | A recent TechCentral roundtable, supported by Tarsus Distribution and Dell Technologies, unpacked the greatest data and security challenges facing South African organisations.
    By Tarsus and Dell Technologies7 March 2023
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Cyberattacks are growing in frequency and sophistication, which is no surprise given that today’s adversaries are well-funded and determined. And as their tools grow more and more targeted and complex, businesses are waking up to the fact that when it comes to attacks, it’s a case of “when” and “how often”, instead of “if”.

    This was one of the findings that emerged when a group of technologists from some of South Africa’s biggest brands attended a roundtable event recently, hosted by TechCentral and sponsored by Tarsus Distribution and Dell Technologies.

    The event aimed at unpacking the greatest data and security challenges that South African organisations are facing, and what to do about them. All agreed that cybersecurity has always been a catch-up game and an arduous and seemingly never-ending task.

    They agreed that any robust security posture depends heavily on understanding an organisation’s soft spots

    They agreed that any robust security posture depends heavily on understanding an organisation’s soft spots, and where they might be vulnerable, but there are several hurdles in the way.

    One is the explosion of data. A large online retailer explained that while a lot of historical data is not needed, deciding at what point to archive involves treading a fine line. Specific industries need to store data for a certain number of years and have it readily available for auditors. Unfortunately, storing everything in the cloud where it is easily accessible is not always cost-effective.

    The sheer size and volume of data, and what to do with it, has become a concern, and all roundtable panellists agreed that this will only get worse as data grows exponentially. It’s hard to secure what you don’t know you have and what you can’t see, so businesses need to find solutions to the proliferation of data as a matter of urgency.

    The group also agreed that humans are the weakest link when it comes to cybersecurity, and more training is needed to raise awareness of the potential risks. Being prepared is key, and this can be achieved by phishing simulations and other scenario planning. After all, being prepared makes making critical decisions a lot easier.

    Use of AI

    However, a panellist and leader in education commented that businesses don’t understand how a lack of insurance could affect them but added that insurers lack the skills to accurately quantify what the risk is. In this way, they said employing a hacker to identify where the company’s weak points are would almost be better than a cyber specialist.

    The conversation then turned to the use of AI, and tools such as ChatGPT, which raised the question of where knowledge creation will go in the future, and whether it has the potential to make lecturers, trainers and researchers redundant. Moreover, a couple of industry leaders in education discussed how without authenticated data it is difficult to determine how competent those who use ChatGPT’s knowledge really are as AI still needs a human component.

    Similarly, they said creativity and authentic thinking need to be encouraged in every industry, which is a massive challenge when tools such as these are so readily available. Making use of technology to enhance “that which is human nature”, one described as “Nirvana”, but said everything depends on the individual using the technology, how they pose the question, and what they do with that information to make better decisions.

    AI can be used for good as well as for bad, and cyberattackers are also using AI tools to automate their attacks and eliminate mundane processes within the cyber kill chain. With this in mind, while all businesses need to implement technologies such as AI, people need to be taught how to use these properly. Similarly, there needs to be more critical thinking on how to apply AI. It has the power to open the door for those who are not talented and free up time for those who are talented to get on with more valuable activities. “In a few years’ time, there will be jobs that we haven’t even thought of yet,” another said.

    One executive in a leading financial institution commented that his organisation is about 20 years behind the times when it comes to AI adoption. The loan application process, for example, is easier in the consumer space where there is credit bureau access. However, when handling between 20 and 40 applications a day for solar, if there was a way to match these applications with some form of AI to leverage the technology until the validation stage at a consumer level, and then scale up to a corporate level, it would be a game changer.

    In ending, while the proliferation of new technologies and burgeoning amounts of data can be obstacles to cybersecurity, they can provide enormous benefits and competitive advantages to the organisation. AI can be used to improve knowledge and help entities understand threats and cyber risk better by scrutinising billions of data points and rooting out any anomalies. Similarly, data can help cybersecurity practitioners by examining the past history of the attacks to understand attackers’ behaviour, which helps to identify any potential attacks before they take place.

    Get in touch

    Small and medium enterprises that need assistance with their technology road map, modernisation or digital transformation strategy can contact Tarsus Distribution here.

    • This promoted content was paid for by the party concerned
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Tarsus Tarsus Distribution TechCentral
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleFortinet debuts security products, professional services for OT environments
    Next Article Apple debuts yellow iPhone 14 in bid to boost sales

    Related Posts

    Why trust is the real currency in modern media

    Why trust is the real currency in modern media

    6 January 2026
    Why TechCentral is the most powerful platform for reaching IT decision makers

    Why TechCentral is the most powerful platform for reaching IT decision makers

    17 December 2025
    H3C and Tarsus ignite a new channel growth engine for Africa's digital economy

    H3C and Tarsus ignite a new channel growth engine for Africa’s digital economy

    20 November 2025
    Add A Comment

    Comments are closed.

    Company News
    AnyDesk - high-performance remote access built for the modern enterprise

    AnyDesk – high-performance remote access built for the modern enterprise

    23 March 2026

    How South African executives can crack the AI ROI code

    20 March 2026
    Africa's first Nvidia RTX Pro GPU servers have landed

    Africa’s first Nvidia RTX Pro GPU servers have landed

    19 March 2026
    Opinion
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026
    VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

    VC’s centre of gravity is shifting – and South Africa is in the frame

    3 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Sanlam appoints group chief AI officer - Theo Mabaso

    Sanlam appoints group chief AI officer

    24 March 2026
    SA's digital economy is booming - but so is the fraud that comes with it - Nomvuyiso Batyi

    SA’s digital economy is booming – but so is the fraud that comes with it

    24 March 2026
    Oracle is rebuilding its software empire around AI agents

    Oracle is rebuilding its software empire around AI agents

    24 March 2026
    AWS again impacted by drone attacks in Middle East

    AWS again disrupted by drone attacks in Middle East

    24 March 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}