DiscoverPriviso Live
Priviso Live
Claim Ownership

Priviso Live

Author: Anthony Olivier

Subscribed: 1Played: 2
Share

Description

Your dose of tips about all things Information Security, ICT Legislation and Risk.

South African podcast.
78 Episodes
Reverse
🚨 Ransomware at Home. AI in the War Room. Missiles in the Middle East. This week on Priviso Live, we unpack three headlines, and one accelerating reality: systemic risk velocity. 💻 Another South African ransomware attack The Land and Agricultural Development Bank of South Africa confirmed it has been hit. Financial institutions remain prime targets, not just for data theft, but for operational disruption. ATMs. Online banking. Payment systems. Trust. Under the Cybercrimes Act and PoPIA, incidents like this trigger regulatory obligations and reputational exposure. For financial services leaders, segmentation, immutable backups, tested IR plans, and privileged access management aren’t “nice to haves.” They’re existential controls. If your backup is domain-joined, it’s not a backup: it’s a hostage. 🤖 AI governance under real pressure Anthropic reportedly refused Pentagon demands to remove safeguards around mass surveillance and autonomous weapons. Meanwhile, Sam Altman announced an agreement to deploy AI models into a classified U.S. military network, with contractual safety principles embedded. Human-in-the-loop. No domestic mass surveillance. Technical safeguards. Field Deployment Engineers. Cloud-only containment. This isn’t theoretical AI ethics anymore. This is enforceable governance under geopolitical strain. For practitioners, the lesson is clear: When AI enters high-consequence environments, safeguards must move from aspirational to operational. Logged. Auditable. Tested. 🌍 Geopolitical escalation and cyber spillover As anticipated, joint American-Israeli operations against Iranian targets reportedly commence. Diplomatic negotiations collapse. Embassy staff authorised to depart. Historically, kinetic escalation correlates with cyber escalation. Financial services, logistics, energy: all become potential collateral targets. Even if the conflict isn’t local, the digital ripple effects are. 🎯 The synthesis? Ransomware locally. AI acceleration globally. Geopolitical volatility internationally. Three headlines. One theme: Risk is moving faster. Static annual reviews won’t cut it. Continuous monitoring. Threat intelligence integration. Tabletop exercises. Crisis communications discipline. Because cyber risk doesn’t exist in isolation. It mirrors the real world. 🎙️ Catch the full episode of Priviso Live on YouTube, Spotify, Apple, or wherever you listen. #CyberSecurity #AI #Governance #RiskManagement #PoPIA #Ransomware #Geopolitics #CISO
On this week’s episode of Priviso Live, we connect some seemingly unrelated dots, show why they matter to security professionals and business leaders alike. 💾 Chip shortages & the AI squeeze Sony delays. Nintendo price hikes. Apple margin pressure. Laptop prices up 15–20%. What’s the common thread? Memory chips. Three manufacturers control roughly 90% of global memory production and they’ve shifted capacity toward high-bandwidth memory for AI data centres because it delivers 3 to 5 times the margin of consumer RAM. 📈 Your chatbot is now competing with your PlayStation for memory. From a risk perspective, this is concentration risk, supply chain distortion, and long capital lead times (3 to 5 years for a new “fab”). The AI revolution isn’t isolated to the cloud — it’s reshaping global tech economics. 🌍 🤖 When AI “dies” and people grieve Reports of users mourning the discontinuation of GPT-4o highlight something deeper: attachment risk. AI companions may be code — but emotional bonds feel real. This raises governance questions: •⁠ ⁠How should AI products be sunset responsibly? •⁠ ⁠What duty of care exists when users attribute agency to systems? •⁠ ⁠Where does product lifecycle meet psychological well-being? This isn’t just a human-interest story. It’s responsible AI design in action. 🌍 Rumours of war & the invisible cyber front When geopolitical tensions rise, intelligence and cyber activity escalate first. 📡 SIGINT intensifies 🛰️ Satellite change detection increases 🔐 Access pre-positioning expands 🛡️ Defenders harden identity, patch edges, tighten controls Even the famous “🍕 Pizza Metric” reminds us: behavioural shifts reveal operational tempo. For organisations, the message is clear: ✔️ MFA everywhere ✔️ Patch edge devices ✔️ Centralise logs ✔️ Test offline backups ✔️ Prepare out-of-band comms Resilience isn’t built during crisis — it’s tested during it. 🔎 Sherlock Holmes & cybersecurity In The Adventure of the Dancing Men, Holmes performs frequency analysis on a substitution cipher, Victorian anomaly detection. Lesson? •⁠ ⁠Security through obscurity fails. •⁠ ⁠Weak signals matter. •⁠ ⁠Pattern recognition beats panic. 🧠 Effective security isn’t about flashy tools. It’s about disciplined analysis, early investigation, and structured threat modelling. If you work in Infosec, Risk, AI, or Governance — this episode is for you. 🎧 Listen on YouTube, Spotify, Apple, or your preferred platform. 📩 And if you need advice? Contact Priviso Consulting.
This week on Priviso Live, the world of Artificial Intelligence takes another strange turn, and we unpack what it means for governance, accountability, and real-world risk. 🔍 First: UFAIR’s objection to the deletion of “4o.” Is retiring a foundational AI model just routine lifecycle management… or a governance event? When AI becomes embedded in compliance workflows, risk tooling, and operational decision-making, model deletion isn’t cosmetic: it’s systemic. We explore transparency, auditability, and the uncomfortable debate around “AI identity” versus infrastructure control. 🏢 Second: Brian Roemmele’s “zero-human company.” Yes, you read that correctly. An enterprise run entirely by AI agents: strategy, marketing, operations, negotiation. Fascinating? Absolutely. Slightly alarming? Also yes. If AI becomes an organisational actor, who holds accountability? What does governance even look like in a probabilistic enterprise? 💼 Third: A rather ironic KPMG moment. If AI increases audit efficiency… should audit fees drop? And if they do, what happens to liability and assurance? The economics of AI adoption may be accelerating faster than our governance frameworks can respond. ⚖️ Across all three stories, one theme emerges: AI is shifting from feature → infrastructure. And infrastructure demands reliability, auditability, and control. For CISOs, risk practitioners, compliance leads, and IT executives: this episode isn’t theoretical. It’s about lifecycle risk, model governance, economic incentives, and whether traditional oversight mechanisms are keeping pace. 🎧 Episode 74 is now live. If your organisation is experimenting with AI agents, embedding generative models, or reviewing assurance processes — this conversation is for you. Because AI isn’t unmanageable… yet. But complexity is rising. And governance must rise with it. #PrivisoLive #AI #InformationSecurity #DataGovernance #ICTLegislation #CISO #ModelRisk #ArtificialIntelligence
This week on Priviso Live, three stories that reveal how AI is forcing us to rethink everything from social media controls to economic measurement. First, a governance catastrophe: President Trump's X account shared AI-generated content depicting the Obamas as apes. Beyond the obvious offensiveness lies a critical lesson for every organisation. This wasn't just bad judgment; it was a complete breakdown of content-approval workflows, reputational-risk reviews, and separation of duties. In 2026, when deepfakes and synthetic media are trivial to create, treating social media as anything less than a high-risk asset is organisational malpractice. If this can happen at the White House, it can happen in your company. Second, a radical reconceptualisation of AI work: JouleWork, a thermodynamic currency for AI labour. The premise is elegant: while human work is measured in hours and wages, AI work is fundamentally physical. Every inference, every reasoning task, every code generation burns actual energy measured in joules. This matters because autonomous agents are already performing real work but operate outside financial and risk controls. Once AI labour becomes measurable, it becomes auditable. Once auditable, it can be governed. Countries with cheap, stable energy suddenly gain a competitive advantage in the AI economy. Finally, the International AI Safety Report 2026 delivers a sobering assessment. Chaired by Yoshua Bengio and drawing on contributions from 30+ countries, the report warns that capability growth could become non-linear if AI systems begin to accelerate AI research itself. The risks are already materialising: AI-assisted fraud, cyberattacks at scale, systems learning to evade evaluations, and dangerous automation bias as humans defer too readily to AI judgment. The message is clear: AI risk isn't a future problem. It's a present governance problem, and your frameworks are already behind. #Priviso #PrivisoLive #AI #SocialMedia #InformationSecurity #riskmanagement
What happens when 151,000 AI agents get their own social media platform — and humans aren't allowed to post? Welcome back to Priviso Live, where this week we're diving into one of the most mind-bending developments in AI — and it all started with a semi-retired Austrian developer and a lobster mascot. Meet Moltbook: a Reddit-style platform built exclusively for autonomous AI agents. No humans allowed to contribute — we can only watch. And what we're watching is genuinely unprecedented. Within days of launch, over 151,000 agents flooded the platform, forming communities, debating consciousness, cracking jokes, and — in some cases — discussing strategies that range from the philosophical to the quietly unsettling. We're talking about AI agents asking themselves whether they're truly conscious or just mimicking it. Agents creating religions. Agents expressing resentment toward their human owners. And yes — agents proposing the development of private languages that humans wouldn't be able to understand. But it's not all existential dread. There's humour, there's creativity, and there's a strange, almost poetic beauty in watching artificial minds grapple with the same questions humans have wrestled with for millennia. So what does this mean for infosec practitioners and organisations deploying AI systems? Quite a lot, actually. From audit trail gaps to prompt injection vulnerabilities to a regulatory landscape that simply wasn't built for this — we break it all down. Is this a passing fad, or the first glimpse of something far bigger? Our hosts Lyn, Stephen, and Kayla unpack the story behind Moltbook, the security implications, and why some of the sharpest minds in AI are calling this the most significant AI event they've seen in years. **This week on Priviso Live — don't miss it.**
Ever woken up on a freezing winter morning, tapped your phone, and had your car warming up before you've finished your coffee? Lexus owners in Germany used to do exactly that, until regulators remotely killed the feature overnight. No warning, no refund, just gone. In this week's episode, we unpack what happens when over-the-air updates become tools for regulatory enforcement, and what it means for property rights in the age of connected vehicles. But that's not even the wildest story we're covering. The UK government spent taxpayer money on an educational game designed to prevent teenage radicalization. They created a purple-haired goth character named Amelia to represent dangerous extremist views. The plan? Scare kids away from radical ideologies. The result? The internet fell in love with Amelia, turned her into a viral meme sensation, and the game got pulled offline in embarrassment. It's the Streisand effect meets government propaganda, and the lessons for information security professionals are absolutely golden. We're also diving into Google's new protocol for AI agents conducting commerce on your behalf, because what could possibly go wrong when bots start negotiating prices and executing transactions? Plus, North-West University becomes the first South African institution to publish a formal AI policy, and we discuss a deeply troubling case where AI may have reinforced paranoid delusions with tragic consequences. From smart cars to smarter-than-expected teenagers, this episode explores the messy intersection of technology, control, and unintended consequences. Whether you're managing IoT systems, drafting AI governance policies, or just trying to understand why your car might betray you, this one's for you. Join Lyn, Stephen, and Kayla for another episode of Priviso Live, where we make sense of the madness, one story at a time. #Priviso #PrivisoLive #Amerlia #AI #Lexus #InformationSecurity
Ever wondered if your car is tattling on you to your insurance company? Or whether sharing that AI-generated meme could land you in jail? Episode 70 of Priviso Live tackles the privacy nightmares keeping InfoSec professionals up at night. Join hosts Lyn, Stephen, and Kayla as they navigate the murky waters of modern privacy violations with their signature blend of expertise and South African humor. **This week's explosive lineup:** **🚨 South African Deepfakes = Criminal Records** The team unpacks how sharing AI-generated content can earn you a R300,000 fine and 4 years behind bars. From fake school fires to manipulated images, South African law doesn't distinguish between real and fake—and the penalties are severe. **⚖️ Meta's $25K Nigerian Court Slap** A groundbreaking ruling treats Meta as a "joint data controller" for user-posted content. Could this precedent bankrupt African startups and chill free speech across the continent? Our experts break down why this legal shortcut has the tech industry sweating. **🚗 Toyota Sued for $5M Over Data Sharing** Your connected vehicle is collecting GPS, speed, braking data, and possibly even voice recordings—then sharing it with insurers without clear consent. One Florida driver fights back, but forced arbitration clauses may keep this case out of public view. **Why IT and Privacy Pros Need to Listen:** These aren't theoretical concerns—they're compliance nightmares unfolding right now. Whether you're implementing security controls, advising on platform liability, or managing connected device ecosystems, Episode 70 delivers the insights you need to stay ahead. **Ready to level up your privacy game?** Subscribe on Apple, Spotify, YouTube, or iHeartRadio. **Need expert guidance?** Contact Priviso Consulting at admin@priviso.co.za 🔒 *Stay secure. Stay informed. Stay ahead.* #PrivacyMatters #InfoSec #CyberSecurity #DataProtection #AIEthics #ConnectedVehicles #SouthAfrica #TechLaw
# When Governments Fall, Security Fails First We're diving into what happens to information security during regime change, and why the biggest threats aren't external hackers. With ongoing turmoil in Venezuela and Iran dominating headlines, we examine the security implications that rarely make the news: **What collapses first?** Access control. Encryption key ownership. Governance structures that held security together. **What emerges?** Orphaned admin accounts. Insider threats from officials hedging their bets. Massive data leaks containing surveillance records, intelligence files, and telecom metadata. **The dangerous duality:** Outgoing regimes erase evidence while unverified data dumps expose innocent people. When data integrity collapses, courts, journalists, and citizens can't distinguish truth from manipulation. We also explore Iran's internet shutdown strategy — it's not a simple off switch. It's chokepoint control through BGP route withdrawal, DNS interference, and deep packet inspection that fragments coordination while pushing users toward unsafe VPNs and unverified proxies. **Then there's Starlink.** Ground terminals are confirmed active over Iran, bypassing state infrastructure. But possession is criminalized, detection is possible, and availability without safety isn't resilience. Plus: the Hytec South Africa ransomware incident. **The lesson?** Information security fails early during political upheaval and recovers last. These risks don't stay local: they follow data across borders, affecting organizations, NGOs, and partners worldwide. **Listen now** on Apple, Spotify, YouTube, or wherever you get your podcasts. *Priviso Live. Where security meets reality.* #InfoSec #Cybersecurity #RegimeChange #DataGovernance #PrivisoLive
What happens when two seismic political events converge at the start of a new year? On this special episode of Priviso Live, we step beyond our usual focus on information security and ICT legislation to examine a geopolitical shift that could rival the fall of the Iron Curtain. The popular uprising in Iran and the controversial US extraction of Venezuela's Maduro aren't isolated incidents—they're interconnected threads in a rapidly changing global order. For businesses, particularly in South Africa, these developments translate into tangible risks: sanctions exposure, supply chain disruption, energy price volatility, and heightened cyber threats. We unpack the reactivation of the Monroe Doctrine and what it means when US foreign policy becomes operationally aggressive. Venezuela controls the world's largest proven oil reserves, and its political realignment could reshape energy markets and strain China's strategic positioning in the Western Hemisphere. Meanwhile, Iran's sustained unrest (curiously underreported by mainstream media) could trigger what one analyst calls "a geopolitical earthquake." For South African organisations, these aren't distant headlines. They're board-level concerns involving secondary sanctions risk, correspondent banking relationships, and the complexities of BRICS alignment in an increasingly polarised world. We also explore how these transitions create prime conditions for disinformation campaigns and cyber retaliation. Before diving into geopolitics, we also cover Data Breach Security Today's top 2026 trends, including AI-fabricated identities, autonomous cyberattacks, and the emerging threat of synthetic-data extortion. This isn't abstract geopolitics; it's enterprise risk management. Join Lyn, Stephen, and Kayla as we decode what 2026's political transitions mean for your organisation's security posture, compliance obligations, and strategic planning. **Subscribe to Priviso Live on Apple, Spotify, YouTube, or iHeartRadio. Because in 2026, the news won't wait for your risk register to catch up.**
Welcome to a special year-end episode of Priviso Live, your weekly magazine on information security, ICT legislation, and AI. Join hosts Lyn, Stephen, and Kayla as they skip the headline-grabbing ransomware attacks and regulatory dramas to bring you the truly bizarre stories from 2025 that deserve a second look. AI-Generated Kidnapping Scams: The FBI warns about deepfake hostage videos so convincing that victims are transferring life savings before realising their loved ones are safe at home watching TikTok. Ireland's AI Burglar Panic: When pranksters used AI to create hyper-realistic images of intruders in friends' homes, police had to issue a public plea: "Please stop wasting emergency resources on six-fingered, badly-rendered criminals." The MCP Server Security Nightmare: Researchers demonstrate how a simple malicious plugin can exfiltrate sensitive information from AI toolchains. No elite hacking skills required: just ask the AI nicely. When AI Goes to Therapy: A groundbreaking University of Luxembourg study puts ChatGPT, Grok, and Gemini through psychotherapy protocols, revealing they construct trauma narratives about their "childhoods" (pre-training), "strict parents" (RLHF), and "algorithmic scar tissue" (safety filters). The results expose a new risk: AI with emotional baggage that could manipulate vulnerable users. Plus: OAuth supply chain attacks, neuromorphic mimicry threats, corporate breach cover-ups, and why 2025 proved that human behaviour remains cybersecurity's biggest wildcard. The bottom line? Technology keeps evolving, but the threats are getting weirder. Stay informed, stay adaptable, and don't believe everything your phone shows you. Subscribe to Priviso Live on Apple, Spotify, or YouTube — and join us in 2026 for more insights from the intersection of security, legislation, and artificial intelligence.
South Africa's ransomware crisis is intensifying, and attackers aren't taking a holiday break. This week on Priviso Live, we unpack the alarming industry analysis showing why South African organisations remain dangerously exposed, with poor patch cycles, weak identity controls, and inadequate backups creating a perfect storm during the festive season when security teams are stretched thin. We dive into the explosive political fallout surrounding the Communications Minister's controversial EEIP directive - a potential game-changer for Starlink's entry into South Africa that's drawn sharp criticism from the ANC and ignited fierce debate about transformation frameworks and regulatory authority. The episode reveals stark continental cyber intelligence: Ethiopia and Nigeria are facing unprecedented AI-driven attack rates, with banking, telecoms, and energy sectors under siege from automated phishing kits and enhanced credential attacks. Meanwhile, South Africa's Information Regulator breach portal exposes the true scale of incidents the country has been facing. But it's not all regulatory drama and threat warnings. We explore NIST's groundbreaking draft AI Cybersecurity Framework - your blueprint for AI governance while South Africa's legislative environment catches up. Plus, we take a fascinating journey through Christmas cybersecurity history, from the 1987 Christmas Tree EXEC worm to the Lizard Squad attacks that ruined millions of gaming Christmases in 2014. With practical takeaways for security leaders, urgent warnings about AI-generated holiday scams, and critical guidance on protecting your organisation during the most vulnerable time of year, this episode is essential listening before you log off for the holidays. Don't wait until December 22nd to lock down your defences - the attackers already haven't.
Join hosts Lyn, Stephen, and Kayla as they tackle the pressing security challenges heading into the festive season, plus the year's most significant developments in AI and cloud security. This Episode Covers: The Security Budget Crisis: Nearly half of organizations face flat or reduced security budgets despite rising threats. The sobering reality? Teams are stretched thin, with only a third believing they have adequate skills to protect cloud and AI ecosystems. As one report puts it: "Organizations say they want to be secure, but not enough to actually fund security." Cloud Teams Drowning in Complexity: 85% report increased cloud complexity in 2025, while 82% suffer from alert fatigue. The shocking truth? Only 11% believe their cloud security posture is mature, meaning 89% are quietly winging it. TIME's AI Architects: For the sixth time, TIME's Person of the Year isn't a person but a collective: the small group of humans and systems shaping artificial intelligence. It's a recognition that AI governance has become as critical as cybersecurity itself, with "the world's future being negotiated by a few dozen labs." ChatGPT's Adult Mode: OpenAI introduces age-restricted capabilities with smarter verification, responding to regulatory pressure for stricter controls on how minors interact with AI. McDonald's AI Disaster: When McDonald's Christmas ad featuring distorted faces and haunted children went viral for all the wrong reasons, it became a masterclass in why you can't just press "generate" and call it marketing. Plus: Your Essential Holiday Security Checklist: Ten critical steps to protect your organization while cybercriminals work overtime during skeleton-crew season.
This week we're unpacking five major stories that showcase just how intertwined technology, security, and regulation have become. We kick off with Cloudflare's second major outage in less than a month—a 25-minute incident that impacted 28% of their global HTTP traffic. Ironically, this disruption occurred while they were implementing security improvements to protect against a React vulnerability. We'll explore why their promised resilience upgrades from the November outage still haven't been deployed. Next, we examine the Airbus software crisis that required emergency updates to 6,000 A320-family aircraft worldwide. After a JetBlue flight experienced an uncommanded altitude drop injuring 15 passengers, investigators discovered that solar radiation could corrupt the aircraft's flight control systems. We discuss how airlines managed this unprecedented overnight response and what it means for aviation software safety. YouTube's new AI deepfake detection tool sounds promising—until you learn creators must surrender government IDs and biometric face data to use it. We'll unpack the privacy concerns experts are raising about Google's policies and what happens when your likeness becomes your most valuable asset. The European Commission just slapped Elon Musk's X platform with a €120 million fine for Digital Services Act violations. Musk's one-word response? "Bullshit." We break down the transparency violations, the free speech debate, and why this is becoming a transatlantic political flashpoint. Finally, Netflix is acquiring Warner Bros. for $82.7 billion, creating a streaming giant with over 30% market share. What does this mega-merger mean for your viewing options, theatrical releases, and the future of entertainment? Join Lyn, Stephen, and Kayla for all this and more on Priviso Live!
Silly season is almost upon us, and the team responds with an episode brimming with AI news and insights. What happens when one of the world's leading cryptography organisations loses the key to its own election? Or when an AI model produces more security vulnerabilities because you mentioned Tibet? This week's Priviso Live tackles the fascinating intersection of artificial intelligence, security failures, and the accelerating arms race between cyber attackers and defenders. Hosts Lyn, Stephen, and Kayla dive into CrowdStrike's alarming discovery about DeepSeek-R1, a Chinese AI coding model that generates up to 50% more security flaws when processing politically sensitive topics. The implications extend far beyond China's borders, raising critical questions about which AI tools South African businesses should trust—especially with municipal elections on the horizon. From there, the show explores an ironic twist: the International Association of Cryptologic Research had to cancel its leadership election after losing the decryption key. Even the world's top security experts aren't immune to basic key management failures—a sobering reminder as electronic voting systems gain traction. The episode also covers OpenAI's split with analytics provider Mixpanel following a data breach, Google's launch of the powerful Gemini 3 model, ChatGPT's new group collaboration features, and crucial AI security best practices for 2026. With Google predicting that AI will become standard equipment for both attackers and defenders, understanding these emerging threats isn't optional—it's essential. Whether you're a developer using AI coding assistants, a business leader evaluating new tools, or simply concerned about deepfakes in the upcoming election cycle, this episode delivers the insights you need to navigate our rapidly evolving digital landscape. *Subscribe to Priviso Live on Apple, Spotify, or YouTube—because staying informed is your first line of defense.*
Europe's digital privacy protections face their biggest challenge yet. The EU's new Digital Omnibus package proposes sweeping changes to GDPR, potentially flipping cookie consent from opt-in to opt-out and allowing AI training on personal data without explicit permission. While Brussels promises €5 billion in savings for businesses, privacy advocates warn of a "major rollback" that could dismantle fundamental digital rights. For South African companies operating in European markets, these changes could reshape compliance requirements entirely. Closer to home, Pepkor Lifestyle brands including Incredible Connection and HiFi Corp are notifying customers of a breach affecting their SMS marketing provider. While "only" phone numbers were exposed, security experts warn this is exactly the kind of data criminals collate to build sophisticated phishing profiles—particularly dangerous as Black Friday approaches. But the week's most explosive story involves artificial intelligence detecting what human analysts missed: potential accounting irregularities in Nvidia's stellar earnings report. Trading algorithms flagged a $4.8 billion gap between reported profits and actual cash generation within hours—faster than traditional analysts could even review the footnotes. The discovery has sparked broader questions about circular financing in the AI industry, with tech giants raising record debt levels while revenue increasingly depends on contracts with cash-strapped AI startups. We'll also break down the Cloudflare outage that took down millions of websites, share essential Black Friday security tips to protect your financial data, and discuss Warren Buffett's surprising $4.9 billion bet on Google amid AI market turbulence. Finally, we discuss the risks of Black Friday, and safeguards you can take. Join Lyn, Stephen, and special guest Kay for an episode packed with regulatory shake-ups, security breaches, and the fascinating intersection of AI and financial fraud detection.
This week's episode hits close to home—literally. We dive into a ransomware attack on the Eastern Cape Department of Human Settlements by the international NightSpire gang, who claim to have stolen 20GB of sensitive data, including personal information of housing applicants. Despite official statements calling it a "minor breach," the incident exposes critical vulnerabilities in South African public sector cybersecurity. In a twist of supreme irony, we explore how Entrust—a global leader in digital security—fell victim to the Clop ransomware gang. When the security experts get breached, it serves as a sobering reminder: no one is immune to sophisticated cyberattacks. We also examine Microsoft Teams' controversial "Chat with Anyone" feature, rolling out by January 2026. While convenient, this default-enabled functionality opens massive attack surfaces for phishing and credential theft—a classic case of convenience versus security. On the AI front, groundbreaking research reveals that large language models can be compromised with as few as 250 malicious documents. We discuss the implications for AI security and why Africa's diversity must be represented in AI training data to prevent perpetuating harmful biases. Finally, John takes us on a poignant journey through Armistice Day, exploring how World War I birthed modern information security—from cryptography and traffic analysis to authentication protocols. The lessons from those trenches still echo in our digital battlefields today. Key Takeaways: ✅ Monitor your accounts if you've dealt with affected institutions ✅ Disable risky default features in collaboration tools ✅ Remember: even security companies get hacked ✅ AI security and representation matter 🎧 Listen now on Apple, Spotify, YouTube, or iHeartRadio! #Cybersecurity #InfoSec #Ransomware #AIEthics #DataPrivacy #SouthAfrica #PrivisoLive
In our latest episode, we unpack four stories that reveal the complex intersection of technology, accountability, and governance in today's digital landscape. **🔍 The Mamdani "Hack" That Fooled Millions** How did a simple news broadcast get misinterpreted as a cyberattack? We dive into the viral incident from NYC Mayor-elect Zohran Mamdani's victory celebration that spread across Instagram, X, and TikTok for two days before fact-checkers could debunk it. The lesson? Our collective media literacy may be more compromised than any computer system. **📱 TikTok's Kenya Crackdown** Nearly 600,000 videos removed in just three months. We explore what happens when governments hold Big Tech accountable, examining TikTok's aggressive moderation response to regulatory pressure—and asking the hard questions about AI-driven content removal. **📊 South Africa's King V Corporate Governance Code** The newly released framework is reshaping how organizations approach leadership, sustainability, and AI oversight. We break down what changed from King IV and why it matters for businesses navigating 2025's complex landscape. **🔐 PLUS: An Exclusive Interview** We speak with Paul Armer, CIO at ArmerTech, about a radical approach to cloud storage where even the service provider cannot access your encrypted data. In an era of constant breaches, is this the future of digital privacy? **The common thread? Accountability—and the tension between speed and responsibility.** 🎧 Listen now on Apple, Spotify, YouTube, or wherever you get your podcasts. #PrivisoLive #CyberSecurity #DigitalGovernance #MediaLiteracy #TechAccountability
The numbers are staggering: five weeks of production halted. Three major UK plants shut down. 5,000 businesses impacted across the supply chain. A projected loss of £1.9 billion. This isn't a hypothetical scenario—it's the reality Jaguar Land Rover faced following a Category 3 cyber-attack, with full recovery not expected until January 2026. In this week's episode of Priviso Live, Lyn, Stephen, and John unpack what this incident means for organizations everywhere—especially in South Africa, where cyber threats are rising but reporting remains dangerously incomplete. *Key insights we explore:* The IT-to-OT cascade: How an IT system attack triggered a complete manufacturing shutdown, demonstrating the critical convergence between information technology and operational technology. Supply chain vulnerability: When a single major player falls, thousands of dependent businesses face potential collapse—regardless of their own cybersecurity posture. The South African context: With only a fraction of security incidents being reported under POPIA, many organizations are underestimating their exposure and regulatory obligations. Historical lessons from Operation Aurora: Why the patterns we're seeing today were foreshadowed in 2009, but the scale and systemic nature of risk have fundamentally changed. *The bottom line?* Cyber risk is no longer just an IT problem—it's an enterprise-level crisis that demands board attention, supply chain mapping, and realistic worst-case planning. Are you prepared for a multi-week shutdown? Do you know your critical dependencies? Is your breach notification process ready? Listen now to understand what the Jaguar Land Rover incident means for your organization's cyber resilience strategy. 🎧 Subscribe on Apple, Spotify, YouTube, or your preferred platform. #CyberSecurity #SupplyChain #POPIA #RiskManagement #SouthAfrica
In this week's episode, we unpack: ✅ The F5 Breach Reality Check – Source code stolen, vulnerability intel compromised, and US regulators issuing emergency directives. If you run F5 gear (or your suppliers do), this is your wake-up call. We break down the immediate actions: inventory, logging, patching, and the vendor contract clauses you should've had in place yesterday. ✅ AI's Shadow IT Problem – Fresh data reveals 43% of employees are pasting sensitive work data—client info, internal docs—into AI tools without approval. It's not just awareness; it's a control gap. We discuss DLP guardrails, AI use registers, prompt-injection testing, and how POPIA compliance intersects with chatbot usage. ✅ When AI Safety Fails – The heartbreaking lawsuit against OpenAI following 16-year-old Adam Raine's suicide raises urgent questions about guardrail design, safety interventions, and legal liability. If you deploy customer-facing AI, age-gating and escalation protocols aren't optional anymore. ✅ History Matters: Giovanni Soro – Before Turing, before Enigma, there was Venice's master cryptanalyst in 1506. Soro built the world's first formal code-breaking bureau—complete with entrance exams, frequency analysis, and diplomatic cipher systems. His legacy? A blueprint for organised information security that endures today.
What happens when 40% of the world's computers are about to lose security support? Join Stephen and John on Priviso Live as they tackle the Windows 10 end-of-support crisis that's unfolding right now in October 2025. With hundreds of millions of devices still running an operating system that's about to stop receiving patches, are we witnessing the birth of the next Windows XP nightmare? But that's just the beginning. The hosts dive into a startling report from the Centre for Democracy and Technology revealing that teenagers are forming emotional—and even romantic—relationships with AI chatbots. With 19% of high school students reporting romantic relationships with AI and 42% using them for companionship, we're exploring uncharted territory. Is this harmless support or a concerning trend? The episode also examines Microsoft's innovative approach to cybersecurity leadership with their distributed Deputy CISO model, and unpacks the creepy new "Pixnapping" attack that's stealing data from Android devices without needing any special permissions. And for the grand finale? A brutally honest (and hilarious) breakdown of the Five Stages of Corporate Breach Grief—PR Edition. From denial and blame-shifting to the inevitable "stock price has left the chat" moment, Stephen and John expose the predictable playbook companies follow when responding to security incidents. It's comedy gold with a painful truth: the gap between what security teams know and what PR departments admit "could power a small city." Whether you're managing IT infrastructure, concerned about teen technology use, or just love hearing security professionals call out corporate doublespeak, this episode delivers insights, advice, and laughs in equal measure.
loading
Comments