Connect with us

GISEC

InoGates to Present HarfangLab at the GISEC 2023

Published

on

Marc Kassis, the Founder and General Manager at InoGates FZCO, speaks about his company’s participation at GISEC 2023

Tell us about the cybersecurity trends for 2023.
InoGates consultants are monitoring the threat level for several years and have noticed a permanent increase. With the political situation in Europe, such a curve is not going to reverse. With almost 20% of Cyber Security worldwide market growth in less than a decade and 50% of Endpoints not protected, we decided to select HarfangLab and promote it in the MEA region.

A major consequence in 2023 is the lack of skills. More than ever, there is a need to develop cyber talents to meet the needs of companies and government organizations. Faced with this requirement, there are two options for solution providers. Either take advantage of the opportunity to sequester their customers by providing a complete solution management package. Or to consider that each company is the most capable of identifying the cyber strategy best suited to its challenges, context, and resources and work to promote the development of talents.

What is the theme of your participation at GISEC 2023?
We have been interested at InoGates in discussing with HarfangLab about their international expansion outside Europe. The MEA region was one of the 3 selected geographies for its great growth potential. HarfangLab is a great alternative to other solutions and is very well adapted to regional security challenges. Let CISOs own their strategic Cyber Security roadmap with a very effective EDR.

Which products and solutions will you be showcasing at GISEC 2023?
We will be showcasing HarfangLab, an EDR (Endpoint Detection and Response) software that detects, neutralises, and remediates cybersecurity threats. Certified by ANSSI, the French national cybersecurity agency, and used in almost all of Europe. The solution is designed to be available both on-premises and on the cloud (SaaS mode). We are participating in GISEC 2023 to demonstrate how the EDR from HarfangLab is able to respect the countries’ data privacy acts as well as the ability to be included in a complete Cyber Security XDR offering thanks to its simple use and openness.

How are you equipped to help companies overcome digital security and privacy challenges?
HarfangLab EDR has high capacities for detection and response to incidents, notably via AI and its numerous automation.
We aim to help SOC analysts to better understand security events through our transparency. Unlike our competitors, all the detection rules are visible.

Add to that, the openness and the numerous connectors of our solution make the integration and interoperability with other solutions easier. Being a European company, we are very used to GDPR and all privacy considerations. when offering an EDR service to our client, we, therefore, think that the MEA region is also sensitive to such important topics. Being a 100% indirect selling model, we build partnerships and accompany our business partners in training and skills augmentation through our learning program.

Is there a skills gap in the cybersecurity industry? What needs to be done in order to bridge that gap?
There is a skills shortage in Cyber Security. At InoGates and HarfangLab, we believe that the role of the software providers goes beyond offering software. Our duty is to ensure that the onboarding of the stakeholders contributes to the overall increase of skills/knowledge on cyber subjects.

Many new solutions are becoming very sophisticated, there will be a need for higher skills. But where to locate these resources? The cyber security market needs to rely more on service providers. This will allow skills development. Naturally, we think that the next generation of cyber protection is going to be serviced with highly developed Service Level Agreements coming from the MSSPs.

Cyber Security

Positive Technologies Reports 80% of Middle East Cyberattacks Compromise Confidential Data

Published

on

A new study by cybersecurity firm Positive Technologies has shed light on the evolving cyber threat landscape in the Middle East, revealing that a staggering 80% of successful cyberattacks in the region lead to the breach of confidential information. The research, examining the impact of digital transformation, organized cybercrime, and the underground market, highlights the increasing exposure of Middle Eastern nations to sophisticated cyber threats.

The study found that one in three successful cyberattacks were attributed to Advanced Persistent Threat (APT) groups, which predominantly target government institutions and critical infrastructure. While the rapid adoption of new IT solutions is driving efficiency, it simultaneously expands the attack surface for malicious actors.

Cybercriminals in the region heavily utilize social engineering tactics (61% of cases) and malware (51%), often employing a combination of both. Remote Access Trojans (RATs) emerged as a primary weapon in 27% of malware-based attacks, indicating a common objective of gaining long-term access to compromised systems.

The analysis revealed that credentials and trade secrets (29% each) were the most sought-after data, followed by personal information (20%). This stolen data is frequently leveraged for blackmail or sold on the dark web. Beyond data theft, 38% of attacks resulted in the disruption of core business operations, posing significant risks to critical sectors like healthcare, transportation, and government services.

APT groups are identified as the most formidable threat actors due to their substantial resources and advanced technical capabilities. In 2024, they accounted for 32% of recorded attacks, with a clear focus on government and critical infrastructure. Their activities often extend beyond traditional cybercrime, encompassing cyberespionage and even cyberwarfare aimed at undermining trust and demonstrating digital dominance.

Dark web analysis further revealed that government organizations were the most frequently mentioned targets (34%), followed by the industrial sector (20%). Hacktivist activity was also prominent, with ideologically motivated actors often sharing stolen databases freely, exacerbating the cybercrime landscape.

The United Arab Emirates, Saudi Arabia, Israel, and Qatar, all leaders in digital transformation, were the most frequently cited countries on the dark web in connection with stolen data. Experts suggest that the prevalence of advertisements for selling data from these nations underscores the challenges of securing rapidly expanding digital environments, which cybercriminals are quick to exploit.

Positive Technologies analyst Alexey Lukash said, “In the near future, we expect cyberthreats in the Middle East to grow both in scale and sophistication. As digital transformation efforts expand, so does the attack surface, creating more opportunities for hackers of all skill levels. Governments in the region need to focus on protecting critical infrastructure, financial institutions, and government systems. The consequences of successful attacks in these areas could have far-reaching implications for national security and sovereignty.”

To help organizations build stronger defenses against cyberthreats, Positive Technologies recommends implementing modern security measures. These include vulnerability management systems to automate asset management, as well as identify, prioritize, and remediate vulnerabilities. Positive Technologies also suggests using network traffic analysis tools to monitor network activity and detect cyberattacks. Another critical layer of protection involves securing applications. Such solutions are designed to identify vulnerabilities in applications, detect suspicious activity, and take immediate action to prevent attacks.

Positive Technologies emphasizes the need for a comprehensive, result-driven approach to cybersecurity. This strategy is designed to prevent attackers from disrupting critical business processes. Scalable and flexible, it can be tailored to individual organizations, entire industries, or even large-scale digital ecosystems like nations or international alliances. The goal is to deliver clear, measurable results in cybersecurity—not just to meet compliance standards or rely on isolated technical fixes.

Continue Reading

GISEC

ManageEngine @ GISEC Global 2025: AI, Quantum Computing, and Ransomware Form Part of Cybersecurity Outlook for 2025

Published

on

As AI-powered attacks and quantum computing reshape the cyber threat landscape, organizations must rethink traditional defense strategies. In an exclusive interview, Sujoy Banerjee, Associate Director at ManageEngine, reveals how businesses can prepare for 2025’s most critical threats—from AI-generated phishing scams to quantum-decrypted ransomware (more…)

Continue Reading

GISEC

Positive Technologies @ GISEC Global 2025: Demonstrating Cutting-Edge Cyber Threats and AI Defense Strategies

Published

on

At GISEC Global 2025, Positive Technologies showcased live demonstrations of sophisticated hacking techniques while emphasising the growing role of AI in both cyber attacks and defense. In an exclusive interview with Security Review, Ilya Leonov, the Regional Director at Positive Technologies revealed insights about the Middle East’s evolving threat landscape, their work with regional governments, and why investing in human expertise remains critical despite advancing technologies (more…)

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.