Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Hurricane Helene’s Unheard Warnings in Yancey County, North Carolina — ProPublica

    May 19, 2025

    How Midnight Cowboy became the only X-rated winner of the best-picture Oscar

    May 19, 2025

    South Africa conquers Africa to take U20 title

    May 19, 2025
    Facebook X (Twitter) Instagram
    • Home
    • Contact Us
    • About Us
    • Privacy Policy
    • Terms Of Service
    • Advertisement
    Monday, May 19
    Facebook X (Twitter) Instagram Pinterest Vimeo
    ABSA Africa TV
    • Breaking News
    • Africa News
    • World News
    • Editorial
    • Environ/Climate
    • More
      • Cameroon
      • Ambazonia
      • Politics
      • Culture
      • Travel
      • Sports
      • Technology
      • AfroSingles
    • Donate
    ABSLive
    ABSA Africa TV
    Home»Technology»Leveraging digital twins to make cyber security smarter
    Technology

    Leveraging digital twins to make cyber security smarter

    Chris AnuBy Chris AnuApril 19, 2025No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Leveraging digital twins to make cyber security smarter
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Nithen Naidoo, founder and CEO of Snode Technologies.


    Digital twins aren’t usually associated with cyber security, but they actually make a perfect pairing. By creating a digital twin of your environment, it’s possible to run AI-enabled attack simulations. These simulations are based on emerging cyber security trends and intelligence from other attacks. Let’s imagine news breaks that a major telco was hacked and you also run a big telecoms business, explains Nithen Naidoo, CEO at Snode Technologies. This is an exceptionally good use case for a digital twin, because you can use the “kill chain”, which outlines all the stages of a cyber attack, from the other incident to understand the attack pattern and assess how well your organisation would have fared were you hit with something similar. With this approach, you can easily identify any gaps and vulnerabilities you might have and see risk through a wider lens.

    “So, the digital twin understands the threat, it understands the asset and its context to the business and it understands what value the asset holds for the threat actor,” he says. “Using this data, these models can map existing vulnerabilities in real-time, outlining events that are most likely to occur and what needs to be done to mitigate these risks.” The great thing about a digital twin is that you have to fix the problem before it will reassess your situation, so if you don’t address the issue, it will continue being flagged. Only once this particular vulnerability is handled will the digital twin then review your environment again and alert you if there are any other weaknesses you should be aware of.

    So, why aren’t more businesses using this approach? According to Naidoo, all the hype around artificial intelligence and large language models has almost eclipsed this application of the technology in cyber security, especially because a digital twin isn’t a solution that one could traditionally buy off the shelf and quickly put to work. “But this isn’t a drawback. Rather, it’s an opportunity for us as innovators and South African cyber security professionals to recognise that this approach really can help us solve cyber security issues.”

    As another example, across the banking and financial services sector, we’re seeing many organised crime groups connecting and colluding with people on the inside to assist with their attacks, notes Naidoo. Using digital twin technology to simulate this kind of event, you can easily assess if you have the necessary internal controls to withstand an attack from a compromised employee. The power comes with leveraging AI to get a more holistic view of your teams so that you can see who might be more susceptible to collusion. If someone on your team has recently been blacklisted, they might be more inclined to help a cyber criminal get into the business because of the potential financial gain. Or perhaps a member of your team recently had a disagreement with management and detailed how they feel undervalued or mistreated by the company on social media. This individual is more likely to participate in malicious cyber attacks as an act of revenge.

    “Remember, we always talk about biased and unbiased data when we discuss AI but, technically speaking, there’s no such thing as unbiased data,” says Naidoo. “There are certain defences we can put in place using the information we have and based on our understanding of trends and human behaviour to safeguard the business against common risks.” So, in the case of the blacklisted or disgruntled employee mentioned above, the business might put more stringent access controls on these individuals so they are never given the tiniest opportunity to execute any kind of fraud in the first place.

    “This approach to security is novel, but it is accessible and available to anyone wanting to give their teams the chance to practise responding to threats in a controlled environment. This kind of evaluation of your security posture is holistic and will help you to identify the root cause of your problems so that you can address the different factors that contribute to this root cause before something big goes wrong.” 



    Source link

    Post Views: 1
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Chris Anu
    • Website

    Related Posts

    Vodacom upgrades growth outlook – TechCentral

    May 19, 2025

    Deepfakes are changing the cyber security threat

    May 19, 2025

    Quantum leap for drug discovery

    May 19, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Who is Duma Boko, Botswana’s new President?

    November 6, 2024

    As African Leaders Gather in Addis Ababa to Pick a New Chairperson, They are Reminded That it is Time For a Leadership That Represents True Pan-Africanism

    January 19, 2025

    BREAKING NEWS: Tapang Ivo Files Federal Lawsuit Against Nsahlai Law Firm for Defamation, Seeks $100K in Damages

    March 14, 2025

    Kamto Not Qualified for 2025 Presidential Elections on Technicality Reasons, Despite Declaration of Candidacy

    January 18, 2025
    Don't Miss

    Hurricane Helene’s Unheard Warnings in Yancey County, North Carolina — ProPublica

    By Olive MetugeMay 19, 2025

    Cattail Creek Thursday Night “This Shits Crazy” In their last phone call before bed, Janicke…

    Your Poster Your Poster

    How Midnight Cowboy became the only X-rated winner of the best-picture Oscar

    May 19, 2025

    South Africa conquers Africa to take U20 title

    May 19, 2025

    Mexico mourns killed Navy cadets

    May 19, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Sign up and get the latest breaking ABS Africa news before others get it.

    About Us
    About Us

    ABS TV, the first pan-African news channel broadcasting 24/7 from the diaspora, is a groundbreaking platform that bridges Africa with the rest of the world.

    We're accepting new partnerships right now.

    Address: 9894 Bissonette St, Houston TX. USA, 77036
    Contact: +1346-504-3666

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Hurricane Helene’s Unheard Warnings in Yancey County, North Carolina — ProPublica

    May 19, 2025

    How Midnight Cowboy became the only X-rated winner of the best-picture Oscar

    May 19, 2025

    South Africa conquers Africa to take U20 title

    May 19, 2025
    Most Popular

    Hurricane Helene’s Unheard Warnings in Yancey County, North Carolina — ProPublica

    May 19, 2025

    Did Paul Biya Actually Return to Cameroon on Monday? The Suspicion Behind the Footage

    October 23, 2024

    Surrender 1.9B CFA and Get Your D.O’: Pirates Tell Cameroon Gov’t

    October 23, 2024
    Facebook X (Twitter) Instagram Pinterest YouTube
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    © 2025 Absa Africa TV. All right reserved by absafricatv.

    Type above and press Enter to search. Press Esc to cancel.