IT in Manufacturing


When cyber attackers are using AI, your defence needs to do the same

I&C July 2024 IT in Manufacturing

Cyberthreats have become increasingly sophisticated, thanks to the use of artificial intelligence (AI). Attacks can now be executed rapidly and scaled beyond anything a human is capable of. Add in machine learning (ML), and attacks can also adapt and evolve in real time, becoming more sophisticated and stealthier. Traditional security measures are simply no longer effective; we need to counter the offensive AI with the use of defensive AI. More than that, however, we need to understand that humans remain the weakest link in any security chain, and awareness of threats and security measures is a critical component in any robust and resilient cyber defence strategy.

The human element

When it comes to social engineering, AI has changed the game for bad actors. Attackers leverage AI and ML tools to analyse social media profiles, online activity, and other publicly available information to create increasingly tailored and convincing phishing messages. This vastly increases the likelihood of success.

While AI can be used in several ways to counter this, from fully automated firewalls and policy management to segmentation, firmware updates and more, this is not a foolproof solution. Humans are still essential links in the security chain.

Education and awareness are critical. We need to be mindful of how we share personal information and what information we place online in the public domain, to safeguard our own privacy. Regular training and awareness can help educate people on cyberattack techniques and best practices for adopting a security-driven culture.

In addition, the human element remains essential in verifying what AI tools are doing; while AI can speed processes and automate manual tasks, people provide the contextual understanding of nuance that AI struggles with. People are also critical in ensuring that ethical considerations are taken into account when building AI models, and when using and processing data. To counter today’s threats, it has become vital to create ‘human in the loop’ defence models, where AI works in tandem with human analysts to respond to threats.


Ivaan Captieux, information security consultant at Galix.

Collaboration is critical

Managed security service providers (MSSPs) can be an invaluable asset for businesses in providing guidance on best practices and industry standards related to AI. This can help organisations understand the ethical implications of AI and security, and develop appropriate strategies to address ethical risk. This includes assessing fairness and transparency in the design of both algorithms and processes. MSSPs can also assist with providing education and training, documenting and communicating processes, and implementing and managing solutions. This includes how algorithms are selected, trained and deployed, and also how data is collected, processed and used for analysis.

Working with MSSPs in collaboration with regulatory bodies can help organisations align security objectives, ensure compliance and assist in implementing ethical practices effectively. Working together is the key to successfully implementing AI, especially when it comes to AI as part of a cyber defence strategy. It is essential to build trust between humans and AI, invest in robust defence systems and monitor for emerging threats. This requires human oversight as the ultimate decision maker. Organisations, MSSPs and regulatory bodies, by working together, can create collaborative ecosystems that foster the development of solutions built on trust that can enhance security posture and mitigate cyber risk effectively.

For more information contact Ivaan Captieux, Galix Group, +27 11 472 7157, [email protected], www.galix.com




Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Fortifying the state in a time of cyber siege
IT in Manufacturing
In an era where borders are no longer physical, South Africa is being drawn into a new kind of conflict, one fought not with tanks and missiles, but with lines of code and silent intrusions. The digital battlefield is here, and cyber space has become the next frontier of conflict.

Read more...
Levelling up workplace safety - how gamification is changing the rules of training
IT in Manufacturing
Despite the best intentions, traditional safety training often falls short, with curricula either being too generic, too passive, or ultimately unmemorable. Enter gamification, a shift in training that is redefining how businesses train for safety and live by those principles.

Read more...
Reinventing data centre design: critical changes to meet surging
Schneider Electric South Africa IT in Manufacturing
AI technologies are pushing the boundaries of what is possible which, in turn, is presenting data centres with a whole new set of challenges. Fortunately, several options are emerging which include optimising design and infrastructure for efficiency, cooling and management systems

Read more...
Watts next - can IT save the planet
IT in Manufacturing
The digital age’s insatiable demand for computing power has collided with an urgent and pressing need for sustainability. As data centres and AI workloads consume unprecedented energy, IT providers are pivotal in redefining how technology intersects with environmental stewardship.

Read more...
South Africa’s digital revolution:
IT in Manufacturing
South Africa stands at a pivotal moment in its technological evolution, poised to redefine itself as Africa’s leading digital powerhouse. Over the past two years, political leaders and media narratives have painted a picture of rapid digital transformation, underscoring the government’s ambition to position South Africa at the forefront of innovation.

Read more...
Smart manufacturing, APC and the SA marketplace
Schneider Electric South Africa IT in Manufacturing
Manufacturers are prioritising the integration of smart technologies into their daily operations to stay one step ahead of the competition. In South Africa, some experts believe the country has the potential to leapfrog its global peers through the creation of smart factories.

Read more...
Schneider Electric’s Five-Pillar Strategy takes the guesswork out of equip
Schneider Electric South Africa IT in Manufacturing
Schneider Electric’s Field Service Cycle, otherwise known as the Five-Pillar Strategy, is a structured approach to managing the lifecycle of equipment to prolong asset lifespan while reducing the total cost of ownership for customers.

Read more...
Enhancing operational safety and efficiency through advanced risk-based modelling
IT in Manufacturing
Now, more than ever, capital and operational cost can be reduced while enhancing operational safety and increasing production uptime by applying transformative methods such as Computational Fluid Dynamics modelling.

Read more...
Laying the groundwork in IT/OT
IT in Manufacturing
In the realm of manufacturing, the core mandate is to deliver value to stakeholders. For many in the industry, this is best achieved through a risk-averse approach. Only upon establishing a robust foundation should a business consider venturing into advanced optimisation or cutting-edge technological innovations such as industrial AI.

Read more...
Looking into the future of machine vision
Omron Electronics IT in Manufacturing
Artificial intelligence (AI) is driving a significant transformation in all areas of industrial automation, and machine vision is no exception. Omron’s AI-powered machine vision systems seamlessly integrate state-of-the-art algorithms, enabling machines to analyse and interpret visual data meticulously.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved