Editor's Note
Welcome to the inaugural issue of the Aigeus Cyber Briefing.

Over the last few years, the South African cybersecurity conversation has fundamentally shifted. It is no longer just an "IT problem" about keeping hackers out; it is a boardroom liability regarding how we govern and protect data.

We started this newsletter to cut through the vendor noise and fear-mongering. Every two weeks, we will deliver actionable intelligence to help you move from the reactive "patching treadmill" to a proactive, legally defensible security strategy.

Let’s dive into our first topic.

What does "Reasonable" actually mean in 2026?

If you look at Section 19 of the Protection of Personal Information Act (POPIA), the mandate for South African businesses seems relatively straightforward. Organizations must secure the integrity and confidentiality of personal information by taking "appropriate, reasonable technical and organizational measures."

For years, the corporate interpretation of a "reasonable technical measure" was simply buying a vulnerability scanner. You run the scan, you get a 200-page PDF listing hundreds of "Critical" or "High" alerts, and you hand it to your IT team to fix.

But as the Information Regulator ramps up enforcement in 2026, this approach has exposed a massive legal and financial blind spot.

The Problem with the "Patch-All" Approach
Traditional vulnerability scanners lack one crucial element: Business Context. Standard tools treat a vulnerability on your public guest Wi-Fi router with the exact same level of urgency as a vulnerability on your HR payroll database. When your IT team is handed a list of 500 "Critical" alerts, they suffer from alert fatigue. They patch what is easy, not what is materially dangerous.

The Regulator's Perspective
If your organization suffers a breach, the Information Regulator will not care that your IT team successfully patched 499 generic bugs that month. They will ask: "Why didn't you prioritize the 1 bug that exposed Special Personal Information?"

If your only defense is a generic scan with no prioritization logic, you cannot prove "due diligence." Your technical measures were not contextually reasonable.

The Solution: Defensible Prioritization
To bridge the gap between technical security and legal liability, organizations are shifting to Risk-Based Vulnerability Management (RBVM).

Instead of chasing every bug, a Risk-Based approach filters the noise by analyzing three core pillars:

  1. Asset Sensitivity: Does this specific server hold POPIA-protected data?

  2. Access Levels: Who (or what autonomous AI agent) has permission to reach it?

  3. Active Threat: Is this vulnerability actually being exploited by syndicates in South Africa right now?

By applying this context, that list of 500 alerts shrinks to the 3% of vulnerabilities that actually threaten your balance sheet.

The Bottom Line
In 2026, you cannot fix everything. But you can protect what matters most. By moving to a Risk-Based strategy, you stop wasting IT budget on low-level bugs and build a documented, audit-ready defense that satisfies both your Board and the Information Regulator.

Aigeus Cyber Briefing

Keep Reading