Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      World Bank set to back South Africa’s big energy grid roll-out

      20 June 2025

      The algorithm will sing now: why musicians should be worried about AI

      20 June 2025

      Sita hits back at critics, promises faster, automated procurement

      20 June 2025

      The transatlantic race to create the first television

      20 June 2025

      Listed: All the MVNOs in South Africa – 2025 edition

      19 June 2025
    • World

      Watch | Starship rocket explodes in setback to Musk’s Mars mission

      19 June 2025

      Trump Mobile dials into politics, profit and patriarchy

      17 June 2025

      Samsung plots health data hub to link users and doctors in real time

      17 June 2025

      Beijing’s chip champions blacklisted by Taiwan

      16 June 2025

      China is behind in AI chips – but for how much longer?

      13 June 2025
    • In-depth

      Meta bets $72-billion on AI – and investors love it

      17 June 2025

      MultiChoice may unbundle SuperSport from DStv

      12 June 2025

      Grok promised bias-free chat. Then came the edits

      2 June 2025

      Digital fortress: We go inside JB5, Teraco’s giant new AI-ready data centre

      30 May 2025

      Sam Altman and Jony Ive’s big bet to out-Apple Apple

      22 May 2025
    • TCS

      TCS+ | AfriGIS’s Helen Hulett on how tech can help resolve South Africa’s water crisis

      18 June 2025

      TechCentral Nexus S0E2: South Africa’s digital battlefield

      16 June 2025

      TechCentral Nexus S0E1: Starlink, BEE and a new leader at Vodacom

      8 June 2025

      TCS+ | The future of mobile money, with MTN’s Kagiso Mothibi

      6 June 2025

      TCS+ | AI is more than hype: Workday execs unpack real human impact

      4 June 2025
    • Opinion

      South Africa pioneered drone laws a decade ago – now it must catch up

      17 June 2025

      AI and the future of ICT distribution

      16 June 2025

      Singapore soared – why can’t we? Lessons South Africa refuses to learn

      13 June 2025

      Beyond the box: why IT distribution depends on real partnerships

      2 June 2025

      South Africa’s next crisis? Being offline in an AI-driven world

      2 June 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » Weaponised hackers want you to keep your legacy cybersecurity

    Weaponised hackers want you to keep your legacy cybersecurity

    By Lucas Ledwaba26 March 2021
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    The rush to enable people to work from home during the initial lockdown ushered in an era of hyper-digitalisation. For many, it created security challenges that initially went unchecked while they focused on health, safety and business continuity challenges.

    Hackers took advantage of the situation and the result is that we now have two pandemics running in parallel: the global Covid-19 pandemic and a fifth-generation cybersecurity pandemic.

    However, many organisations are hampered by their continued reliance on second- and third-generation security, generations that are characterised by many disparate, non-integrated security point solutions. At the very least, organisations typically have firewall, anti-virus, end point security software, usually from a wide range of vendors. Some have on-prem SIEM (security information and event management) solutions that often exacerbate the shortage of skills necessary to salvage some form of security capability.

    See Pi-SOAP in action now

    The result is it’s difficult to integrate the entire security environment and that makes it less effective. It is labour intensive, which is slow and prone to errors, while generally limiting companies to detection only rather than being able to respond quickly and have a single pane of glass into their secured digital landscape.

    Hackers quickly figured this out and took advantage of home workers additionally being disconnected from their IT security staff during lockdown. The frequency of phishing attacks related to health and safety around the health pandemic rose sharply. Hackers targeted the age-old security weakness: human emotion. But they had a slew of new weapons in their arsenals.

    Businesses that have remote workers, systems in the cloud, mobile devices and distributed Internet devices, need fifth-generation cybersecurity

    Fifth-generation cyberattacks are what the World Economic Forum calls “weapons-grade hacking”. It’s when hackers automate their attacks, so they are faster, more lethal and more efficient at exploiting weaknesses. Businesses have to improve their capabilities to deal with these bold new threat vectors.

    Businesses that have remote workers, systems in the cloud, mobile devices and distributed Internet devices, need fifth-generation cybersecurity. It gives them integrated, unified security architectures that share threat intelligence in real-time for fast, orchestrated (automated) responses on live network traffic (inline security).

    Skills shortage

    Fifth-generation cybersecurity maximises the guiding principles behind any secure system, platform or network: real-time prevention, consolidation, integration and visibility, and continuously updated threat intelligence.

    A major challenge, however, is the dire shortage of skills. Most businesses have to bolster their threat-detection capabilities. But they also need to create new capabilities to respond to attacks quickly. Traditional methods don’t work. Many organisations simply cannot find the people with the skills they need.

    That’s why Phakamo Tech created Pi-SOAP, the Phakamo Intelligent Sec Ops and Analytics Platform. It is a managed service that delivers a consolidated cybersecurity architecture that protects networks, endpoints, cloud systems and mobile devices against fifth-generation, weapons-grade hacking.

    Pi-SOAP handles the complexities around growing connectivity and inefficient security architectures. It delivers real-time threat prevention against known and unknown threats. It leverages Microsoft’s most advanced global threat prevention and other zero-day technologies. It automates threat intelligence-sharing and provides consistent security across all Check Point components, to close security gaps. It consolidates multiple security layers for superior policy management and optimised visibility.

    Additionally, it’s entirely staffed with black women security engineers and therefore provides businesses with level-1 broad-based black economic empowerment benefits.

    The women who operate Pi-SOAP and Phakamo Tech have a wealth of industry and vendor qualifications and certifications

    The women who operate Pi-SOAP and Phakamo Tech, a Microsoft Security Partner of the Year finalist, have a wealth of industry and vendor qualifications and certifications. Phakamo Tech covers all blue, red and white cybersecurity team elements for turnkey prevention, detection, response, and risk and compliance enablement consulting.

    Leveraging Phakamo’s Pi-SOAP, embattled South African organisations, from government to commercial enterprises, are equipped to rapidly scale out their security posture to tackle the most advanced modern threats that have already hit some of the country’s largest institutions. With Pi-SOAP, they now have the best skills detecting, preventing, and responding to the new wave of attacks overwhelming other businesses stuck with traditional architectures, unable to find the skills to advance.

    Phakamo Tech: We enable and secure your digital transformation, embedding digital trust across organisations as we address the three pillars of cybersecurity, risk and compliance.

    See Pi-SOAP in action now.

    • Lucas Ledwaba is CEO at Phakamo Tech
    • This promoted content was paid for by the party concerned


    Lucas Ledwaba Phakamo Phakamo Tech Pi-SOAP
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleFortinet delivers major updates to FortiOS
    Next Article Twitter’s Jack Dorsey trolls US politicians during hearing
    Company News

    Making IT happen: how Trade Link gears up to enable SA retail strategies

    20 June 2025

    Why parents choose CambriLearn for online education

    19 June 2025

    Disrupt first, ask questions later – the uncomfortable truth about incident response

    18 June 2025
    Opinion

    South Africa pioneered drone laws a decade ago – now it must catch up

    17 June 2025

    AI and the future of ICT distribution

    16 June 2025

    Singapore soared – why can’t we? Lessons South Africa refuses to learn

    13 June 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.