Winning the battle against surging cybercrime

Issue 6 2023 Information Security


Caesar Tonkin.

“Cybersecurity peers share a joint purpose to protect organisations from threats and attacks that could be material to staying in business,” says Armata Executive Head, Caesar Tonkin, who led the second Armata cybersecurity industry webinar called Detecting and Protecting against Endpoint Threats.

The key theme at the latest event was that endpoint detection and response (EDR) represents the best chance for organisations to win the battle against a surging cybercrime wave that evolves too fast and is too advanced for traditional tools such as antivirus or anti-malware tools.

During his keynote address, Tonkin presented shocking figures from recent Microsoft research. Some of the insights he shared included that there were 921 parcelled attacks per second in 2022 – a 74% increase from 2021 and that 93% of Microsoft investigations during ransomware recovery engagements revealed insufficient privilege access and lateral movement controls, and that the mean time it takes an attacker to move laterally within a corporate network, once a device has been compromised, is one hour and 45 minutes. Perhaps most startling is that 98% of cyberattacks can be prevented with basic security hygiene.

“From an Armata point of view, we offer our customers help with basics such as security hygiene, but also bring specialised interventions with in-depth aspects of cybersecurity,” he said. He referenced LockBit, which is akin to a ransomware-as-a-service machine. “The pace at which they are targeting organisations, globally and in South Africa, is cause for concern and certainly something that we need to be mindful of in this country,” said Tonkin.

“When we do threat hunting, we analyse the steps that criminals follow – their tools, techniques and tactics. What looks like normal software behaviour – criminal actors can hide behind. These cannot be detected using basic anti-malware,” explained Tonkin, who said that organisations need to develop threat intelligence and the indicators of compromise. This will help them to join the dots as to what threat adversaries are doing to try to infect and cause harm. “As CISOs we must link ransomware attacks to business risk at exco and board level,” he said.

Tonkin introduced cybersecurity expert Emile Coetzee and Microsoft’s Wessel Pieterse, who spoke about the current endpoint threat landscape and what they thought the endpoint threat landscape would look like heading into 2024; the reasons for selecting an EDR platform and not only standard antivirus or anti-malware tools; the business benefits that arise from adopting an EDR platform, automated detection, cyber defence and response handling against advanced threats that could be harmful; and lessons learnt during threat hunting and defending against advanced threats and malware.

A key theme to emerge from these discussions was the pace at which the world of cybercrime is evolving. Even if the usual suspects, such as email compromise or phishing, still show up, the innovative and new ways that criminals are positioning their attacks are cause for concern. Against this backdrop, both panellists and Tonkin agreed that an EDR platform emerges as a non-negotiable for a business wishing to secure its systems.

“Whereas anti-virus, for example, adopts a pre-breach mindset, meaning that it has a series of known signatures or files to scan for,” explained Pieterse, “the industry needed to move to ‘an assumed breach mindset’.

“That's what EDR does. We still look for known signatures, but what we are looking for primarily is a sequence of events and behaviours, using machine learning and artificial intelligence to analyse known behaviours and the normal state of individual endpoints to discover malicious actions and behaviours, rather than relying on a certain set of files or signatures like an anti-virus.”

Coetzee agreed that an EDR was non-negotiable. “My advice to any business, even an SME, would be to invest in a good EDR solution and then partner with a company of experts who can manage the tool for you so that you can sleep at night.”




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
AI security with AI Cloud Protect
Information Security
AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zero impact on performance.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.