Connect with us

Technology

Avoiding Security Complexities

Published

on

Security Complexities

Many years ago, the firewall was everything. Defence-in depth was a concept defined as layered defence with multiple firewalls on the path.

Behind the firewall was a fortress. Organisations designed networks with strong perimeters and demilitarised zones to ensure the crown jewels were well-protected. Attackers had a difficult time trying to break into the firewalls.

On the physical layer, Network Admission Control (NAC) technologies were implemented to prevent intruders from having direct access into the network by preventing them from plugging unauthorised devices into the network. Before a device was admitted, it had to meet a minimum requirement defined by the organisation.

Those years are gone and maybe gone forever. Cloud computing, Bring Your Own Device (BYOD), Artificial Intelligence, Internet of Things (IoT), VPNs and Remote Working Capabilities have dramatically changed the way businesses run.

These technologies have introduced a level of innovation and disruption that were unimaginable only a few years ago. They have resulted in the collapse of the traditional network perimeter, thereby increasing the attack surface for cyber-attacks. Enterprise networks coverage is today being extended beyond our imagination – outside the traditional datacentres to smartphones, cloud platforms, mobile computers and IoT interfaces without geographical boundaries.

The bad guys now have a plethora of interfaces to launch their attacks on; they do not have to breach the network using traditional social engineering tactics physically.

The recent changes in the work environment occasioned by the COVID-19 have further amplified the extension of network boundaries beyond the traditional datacentres. Employees work from home with devices and connections into the enterprise networks that were not originally designed for such. Improvised connections were made to allow functionality because the pandemic came without announcement.

The danger this poses is that some of these end devices were not originally designed with security in mind. Even if security was a consideration, not so much for enterprise data protection. These devices are most of the time not hardened, and their owners may not understand the effects on the overall organisational security posture.

A handful of these devices are installed with default passwords, and most times, these passwords are not changed during or after installation.

So, it is easy to guess the password by manual methods or using advanced dictionary or brute force attack methods. Another risk posed by these endpoints is the lack of security updates and patches. Because they are sometimes not seen to be part of the enterprise network, they are not included in the patch management programme, and their presence introduces high-level vulnerabilities within the enterprise network.

It then becomes easier to utilise malware that could tunnel through the firewall to breach the enterprise network, instead of spending months and years trying to break into the firewall or layers of firewalls.

In recent years, large-scale attacks have been launched using malware by exploiting known vulnerabilities and security gaps on endpoints.

For example, the WannaCry, Petya and another variant of Petya, the NotPetya were employed to launch attacks on enterprise networks through vulnerable endpoints. Another danger with this trend is potential data leakage because these devices are used to either temporarily or permanently store organisational data.

There is also concern about device loss. If these devices are lost, there is a risk of exposing the organisation’s data to unauthorised entities, and that could both result in financial and reputational damage.

These dangers are also expanded by the impact of the COVID 19 pandemic, where organisations made ad hoc improvisions to support businesses while employees work from home.

As commerce resumes, organisations are beginning to discover some capabilities to support their businesses remotely, and they are also rethinking their business continuity strategies.

For some businesses, this is not just a temporal shift, but a change which has permanently altered the operational procedures of the organisation.

Legacy cybersecurity strategies, techniques and investments will not be enough to mitigate the rising cybersecurity concerns introduced by this new way of working. Protection has gone beyond throwing in uncoordinated technical solutions and efforts.

Organisations need to rethink a new approach for the protection of their assets within the ever-growing complexity both to remain afloat and also to derive commensurate Returns On Security Investments (ROSI). A well-crafted strategy will ensure that cybersecurity efforts are coordinated within the enterprise, without duplication of efforts and resources, which will, in turn, drive down the cost of implementing cybersecurity initiatives.

To improve the security posture, organisations must do the following:

    Continuously monitor the devices, applications, and processes running on the network.

    Automate security monitoring and mitigation.

    Implement systems that are capable of automatic detection, isolation and containment of threats within the network.

    Ensure that monitoring covers event data, session data, and historical data on endpoint usages, such as past processes, network connections, and other information.

Another measure organisations should take is reducing complexities. The extension of the network boundaries has not stopped organisations from using existing network solutions to protect the enterprise network.

However, in a bid to ensure the protection of the on-premise infrastructure and the ones beyond the organisational traditional network boundaries, organisations combine existing technologies with new solutions and the resultant effect is an increase in complexity.

To effectively manage security, organisations should put measures in place to ensure a reduction in complexity and enhancing visibility. This can be achieved by unifying all efforts and technologies for managing both on-premise and off-premise infrastructure in a single platform. Beyond technical controls, organisations should develop procedures, standards, and policies for acceptable use of organisational resources.

For further information and engagements on the pcl. cyber security services, send an email to [email protected]

Technology

Our Goal is to Meet Soaring Demand for Connectivity—MTN

Published

on

MTN Nigeria commercial paper sales

By Dipo Olowookere

The Chief Strategy and Innovation Officer for MTN Nigeria, Mr Babalola Oyeleye, has disclosed that the telecommunications company intends to expand its infrastructure to give its customers quality service.

The demand for connectivity in Nigeria is growing, and with a new forecast predicting the Internet of Things (IoT) market to reach $38.7 billion by 2030, stakeholders, especially operators, are already positioning themselves to dominate the space

Government and private sector investments in digital transformation have created an ecosystem that includes system integrators and security specialists. Industries such as utilities and agriculture are leading the charge, adopting IoT to solve localised problems like power theft and low crop yields.

Currently, 4G coverage has reached approximately 80 per cent of Nigeria’s population, with 5G services already in major cities like Lagos, Abuja, Port Harcourt, and Kano. This connectivity backbone is essential for the low-latency communication required by millions of connected devices.

“Reaching the $38.7 billion mark isn’t just about the numbers; it’s about the millions of data points helping Nigerian SMEs and large corporations make smarter decisions every day. Our goal is to ensure the connectivity is there to meet this soaring demand,” Mr Oyeleye noted.

As the ecosystem matures, the focus is shifting toward all-in-one solutions that simplify the user experience. With ongoing investments in NB-IoT (Narrowband IoT) and other low-power connectivity options, the next five years are set to see an explosion in smart city and smart home applications across the country.

Continue Reading

Technology

Refiant AI Raises $5m to Cut AI Energy Use

Published

on

Refiant AI

By Adedapo Adesanya

South African-founded Refiant AI has raised $5 million to slash the energy footprint of artificial intelligence (AI) in a seed round led by VoLo Earth Ventures, a top climate technology fund.

The startup uses nature-inspired algorithms to radically compress AI models, slashing the hardware and energy required to run them. The new fund will be used to scale Refiant’s team – which already includes a former Google Cloud architect, a Cambridge PhD researcher, and an engineer with NASA experience – to build out a platform and to accelerate enterprise partnerships.

According to a statement shared with Business Post, the company is in active conversations with several multinational technology firms exploring how Refiant’s approach could reduce their AI compute costs while maintaining data and energy sovereignty.

“AI’s growing energy footprint is one of the most urgent and underappreciated challenges in the climate space,” said Mr Sid Gutta, the company’s co-founder. “The industry’s default answer is to build more data centres and consume more power. Ours is to make the AI itself dramatically more efficient.”

The company said it has already successfully demonstrated it can compress a 120 billion parameter AI model to run on a standard laptop, reducing energy requirements by over 80 per cent while preserving near-identical quality. It achieved this to run on a MacBook Pro with just 12GB of RAM. The same model would normally require hardware with at least 80GB of memory. The model retained 95-99 per cent of its fidelity, ran alongside a second AI model on the same machine, and the entire process took four hours with no cloud computing required.

For Refiant, its approach will help businesses reduce their carbon footprint and adopt AI to stay competitive. The energy required to process a single AI prompt on standard infrastructure could power roughly 100 equivalent prompts using Refiant’s approach.

The current breakthrough results were attained at the end of last year, and since then, the team have been gearing up to demonstrate successfully exceeding these results with further compression, longer context windows and model traceability.

“The AI industry is spending hundreds of billions scaling infrastructure when the real breakthrough is the ability to do more with radically less,” said Mr Viroshan Naicker, co-Founder and a mathematician with published research in networks and quantum systems. “Nature doesn’t build by brute force. Evolution optimises. We’ve applied that principle to AI – and the results speak for themselves.”

“AI’s biggest constraint isn’t demand – it’s energy,” added Mr Joseph Goodman, Managing Partner, VoLo Earth. “What’s been missing is a fundamentally more efficient way to compute. Refiant’s architecture replaces brute-force scaling with a far more efficient, nature-inspired approach that lowers energy use while increasing capability. That’s the kind of breakthrough needed to make AI sustainable on a global scale.”

Continue Reading

Technology

Google, UpSkill Universe Revamp Hustle Academy to Bring Free AI Skills to Africans

Published

on

Google Hustle Academy

By Adedapo Adesanya

Google and UpSkill Universe, Sub-Saharan Africa’s leading AI and business skills training partner, have announced a major redesign of the Google Hustle Academy programme. For the first time, the free training initiative is open to everyone, not just business owners.

The new curriculum is focused on equipping individuals and entrepreneurs with practical AI skills and comes at a time when small businesses have become the engine of Africa’s economy, creating over 80 per cent of jobs on the continent. To help them grow, the Hustle Academy was launched in 2022, providing bootcamp-style training on business strategy, digital skills, AI, and leadership. The program has since trained over 18,000 SMEs, with many reporting increased revenue and job creation.

Now, as AI reshapes the job market, the program is evolving. The 2026 edition is built for anyone in Sub-Saharan Africa, including employees, students, and job seekers, who want to use AI to advance their careers. To meet the needs of a diverse audience, the new format includes short, 60-minute webinars and more immersive, high-impact bootcamps. These sessions are laser-focused on putting AI to work immediately in areas like digital commerce, marketing, and growth strategy.

Speaking about the academy, Mr Gori Yahaya, Founder & CEO of UpSkill Universe, said, “The 2026 Hustle Academy is designed to close the AI Skills gap with hands-on training that is short, focused, and immediately useful. AI is reshaping how businesses win and how careers are built, right across this continent. We’re excited to renew our partnership, now in its fifth year with Google, combining their global AI leadership with our deep regional AI expertise. The next wave of AI leaders will come from this continent. We are making sure they are ready.”

The Hustle Academy initiative has strengthened digital competitiveness across emerging African economies by enabling SMEs to move beyond AI awareness to practical implementation, positioning them for sustained growth in an increasingly AI-driven business environment.

“We believe that the future of Africa’s digital economy lies in the hands of individuals and entrepreneurs alike. Our new strategy focuses on scaling reach by training individuals in the latest AI-centred tools and techniques,” said a Google representative.

Applications for the 2026 cohort are now open. Interested participants can apply at: https://rsvp.withgoogle.com/events/hustle-academy

Continue Reading

Trending