NEC AFRICA
  • Home
  • About Us
  • Portfolio
  • Blogs
  • News
  • Case Studies
  • Contact Us
  • Home
  • About Us
  • Portfolio
  • Blogs
  • News
  • Case Studies
  • Contact Us

Blogs Posts

4/11/2025

How NEC XON is powering the future of Cybersecurity

 
Picture
Every digital interaction carries inherent risk. That means cybersecurity can no longer be seen as a shield - it must be the foundation of digital trust.
The threat landscape has evolved beyond the occasional breach or isolated ransomware attack. Today’s adversaries are adaptive, persistent, and often invisible until the damage is done. The response from industry leaders like NEC XON has been to shift from reaction to anticipation - from defense to design.

Read More

20/10/2025

Cybersecurity Is Broken: NEC XON Is Rewriting the Rules

 
Picture
By Michael de Neuilly Rice, Cybersecurity Architect at NEC XON
​Picture this: a GenAI-powered insurance system quietly miscalculates thousands of policies after its training data was poisoned. No alarms go off. No one notices - until claims are denied, customers revolt, and regulators move in.
 
That’s the kind of threat we’re facing. The real risk with AI isn’t what the AI does - it’s what’s been done to the AI.

Read More

14/10/2025

Cybersecurity Is Not a Product Stack – It’s a Platform Strategy

 
Picture
By Philip Wege, Network Security Lead Engineer at NEC XON
Complexity is the adversary of cybersecurity resilience. Too many organisations still try to secure their environments with a patchwork of point solutions, hoping that post-deployment integration will bring coherence. In reality, this approach creates silos, increases operational friction, and leaves exploitable IT blind spots. From a systems engineering standpoint, it’s the equivalent of assembling critical infrastructure from mismatched components without a unifying architecture - inefficiency, inconsistency, and failure are inevitable outcomes.

Read More

19/8/2025

Securing the Telecom Frontier: How Fortinet SecOps Builds Resilience Across the Stack

 
Picture
By Andre Lombaard, Network and Security Architect at NEC XON
Telecoms Under Fire
Telecom networks are no longer just critical infrastructure — they’ve become strategic targets for cybercriminals. From sophisticated nation-state actors to profit-driven cybercriminals, the telecom sector is facing unprecedented security pressure.

Read More

5/8/2025

Inside the Mind of a Security Enhancer: NEC XON’s Approach to Modern Cybersecurity

 
Picture
By Andre Lombaard, Network and Security Architect at NEC XON
When it comes to enterprise cybersecurity there’s often more noise than clarity. More tools than alignment. More pressure than purpose. My mission is to cut through all of that — not just to secure environments, but to enhance them. I don’t see myself as a traditional security architect or consultant. I see myself as something different: a Security Enhancer.

Read More

11/3/2025

NEC XON MDR helps organisations pe-empt cyber attacks

 
Picture
By Thobani Njamela, Cybersecurity Lead: MDR (Manage Detection and Response)
Constant corporate adaptation to new business models and their technology requirements is a double-edged sword. While it’s an unavoidable business need, the process introduces a constant stream of new cyber threats and vulnerabilities. The critical question is: how do organisations proactively prepare for these cyber-attacks?

Read More

4/2/2025

Demystifying Phishing

 
Picture
By Sanelisiwe Jaffar, Senior Cybersecurity Engineer at NEC XON
October is Cybersecurity Awareness Month, a good time to discuss the new ways scammers are finding to trick people into divulging their sensitive information (social engineering). Social engineering uses people’s emotions to trick them into revealing sensitive information. Today, we focus on four common social engineering attacks: phishing, vishing, smishing, and quishing.

Read More

11/7/2024

Defending Against Cybercrime Even More Relevant in a Digital World

 
Picture
By Michael de Neuilly-Rice, Cyber Security Architect at NEC XON

In a hyper-connected, always-on world, both citizens and businesses must develop robust, multi-layered cybersecurity strategies to combat the flourishing cybercrime ecosystem. These illicit markets have become more accessible, necessitating security strategies and tactics that reflect the increased prevalence of attacks.

Read More

4/7/2024

NEC XON achieves ISO 45001 certification

 
Picture
Thabiet Gabier, Head SHEQ Department at NEC XON

I am delighted to share the news that our Safety, Health, Environment and Quality (SHEQ) department has received the ISO 45001 certification. This is a significant advanced safety culture milestone for NECXON, making us one of only two NEC affiliates in EMEA, alongside NEC UK, to achieve this rigorous standard.

Read More

25/4/2024

SASE: The Future of Secure Remote Work

 
Picture
Michael de Neuilly Rice, Cyber Security Architect at NEC XON

In an era where workplace boundaries are increasingly fluid, traditional enterprise network security is inadequate. The rise of cloud adoption, coupled with the ubiquitous nature of remote work, demands a security solution that is as dynamic and agile as the modern workforce itself. Enter Secure Access Service Edge (SASE), the beacon guiding enterprises toward a future-proof network infrastructure.

Read More

9/4/2024

NEC's Social Impact helps farming, energy & telecom

 
Picture
Yosuke Koide, General Manager: Global Synergy Creation

​Like many countries on the African continent, South Africa has a young, growing population. However, its roughly 60-million population face a challenge that may be surprising to people from other countries: daily power outages that may last as long as 12 hours. It’s a challenge that Yosuke Koide is working to address through cutting-edge technology developed by NEC.​

Read More

5/3/2024

The Rise of XDR and the Decline of SIEM and SOAR

 
Picture
Michael de Neuilly Rice, NEC XON Cyber Security Architect

NEC XON often finds itself at the nexus of innovation, exploring new technologies to enhance defence mechanisms against evolving threats. Recently, while implementing a Security Information and Event Management (SIEM) solution for a client, our team had a moment of reflection: could a mature Extended Detection and Response (XDR) system have provided even greater benefits?

Read More

1/2/2024

Resurgence of AiTM Attacks in Cybersecurity

 
Picture
Divan de Nysschen, Cybersecurity Architect, NEC XON

Unmasking AiTM: The Resurgence of Adversary-in-the-Middle Attacks in Cybersecurity
In the dynamic realm of cybersecurity, threats often disappear temporarily, only to evolve and reappear in more sophisticated forms. One such resurgence is the Adversary-in-the-Middle (AiTM) attack, a potent phishing tactic that poses a significant risk to the security of SaaS applications. How should organisations prepare themselves to counter this formidable threat?

Read More

17/1/2024

Future of Cybersecurity: Identity-Centric Zero Trust

 
Picture
Michael de Neuilly-Rice, ​NEC XON Cybersecurity Architect 

Embracing Identity-Centric Zero Trust: A Glimpse into the Future of the Modern Cybersecurity Perimeter
In the fluid cybersecurity landscape, the focus has shifted from fortifying network perimeters to acknowledging the critical role of identity and user authentication. Threat actors no longer exploit vulnerabilities; they log in using legitimate credentials. This paradigm shift calls for innovative security approaches. One approach gaining prominence is Identity-Centric Zero Trust.
 

Read More

22/11/2023

Comprehensive Cybersecurity in Digital Era

 
Picture
Michael de Neuilly-Rice, ​NEC XON Cybersecurity Architect ​

The Evolution of Cybersecurity Challenges
Traditional cybersecurity measures, including firewalls, antivirus software, and encryption, have undoubtedly been instrumental in protecting digital environments. However, the relentless evolution of cyber threats, coupled with the innate vulnerabilities associated with human behaviour, has created a shifting paradigm that necessitates a more comprehensive strategy.

Read More

9/11/2023

Cyber threat anticipation: how NEC XON leads the charge

 
Picture
​Armand Kruger, Head of Cyber Security at NEC XON

NEC XON, a cybersecurity leader, is at the forefront of this fight, pioneering innovative approaches to enhance cyber defence and resilience.

Read More

27/10/2023

Boosting Employee Cyber Awareness with ModernStrategies

 
Picture
By Divan de Nysschen, Cybersecurity Architect at NEC XON

Malicious actors seeking to infiltrate networks would rather find a way to be given a key to the castle by an unsuspecting human than try to climb the ramparts or break through a thick iron gate. Recent statistics reveal that a staggering 22% of all cyber breaches stem from phishing attacks, which take an alarming 295 days, on average, to contain.
​

Read More

22/5/2023

Pioneering people-centric AI in a data-centric world

 
Picture
​By Yosuke Koide | General Manager: Global Synergy Creation at NEC XON

There’s an AI revolution happening in the data-centric world! Data has become the lifeblood of our digital age, but the sheer volume and complexity present significant challenges. NEC XON acknowledges that the real value lies in effectively processing, analysing, and extracting meaningful insights from vast data repositories. Leveraging AI, we empower organisations to navigate the data deluge effortlessly.
​


Read More

5/5/2023

NEC XON fills the IT Human Capital Gap

 
Picture
By Stephan Ras, Executive: Managed Services and Consulting at NEC XON Systems

As a business owner or manager, you know the importance of having a skilled and reliable workforce. I can relate to your pain. In today’s constantly changing employment landscape, finding and retaining top-tier talent can be a huge challenge. The ICT sector, in particular, has been characterised by continuous turnover and churn, and the challenge is set to grow in the post-COVID-19 era.

Read More

2/4/2023

NEC XON breaks ground in Africa's quest for 5G OpenRAN

 
​By Willem Wentzel | Head of Wireless at NEC XON

​5G OpenRAN (ORAN) technology that enables mobile operators to open the RAN network and use multi-vendor solutions holds huge promise for business growth in Africa. It means network operators can focus capital expenditure (capex) on competitively priced open-standards equipment rather than proprietary gear.

“It enables attractive savings of about 40% on capital expenditure and 30% on operating expenditure (OPEX),” says Willem Wentzel, head of Wireless at NEC XON. “It can also be deployed in a matter of two to three days instead of up to nine months. But the realities of Africa mean that 5G ORAN will initially be limited to private corporate networks in industries like mining, manufacturing and industrial where large campuses are common. Public ORAN networks are likely to remain on 4G for the moment, given the level of investment in existing infrastructure and the prohibitive cost of 5G handsets (UE) for consumers.”

Read More
Previous

    Archives

    November 2025
    October 2025
    August 2025
    March 2025
    February 2025
    July 2024
    April 2024
    March 2024
    February 2024
    January 2024
    November 2023
    October 2023
    May 2023
    April 2023
    February 2023
    January 2023
    December 2022
    August 2022
    July 2022
    June 2022
    April 2022
    January 2022

    Tags

    All
    5G
    AI
    Careers
    Cyber Security
    Digital Transformation
    Human Capital
    Infrastructure

    RSS Feed

Navigation

​Home
About Us
Portfolio
Blog Posts
News Room
​Contact Us

Additional

Corporate Magazines
Legal & Compliance
​Global Privacy Notice​

External Link

NEC Corporation
ITWeb Press Office
 © Copyright 2025. All rights reserved.
Facebook X LinkedIn YouTube