Interviews – Security Review Magazine https://securityreviewmag.com We bring you the latest from the IT and physical security industry in the Middle East and Africa region. Mon, 12 May 2025 12:14:22 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://securityreviewmag.com/wp-content/uploads/2024/08/cropped-SRico-32x32.png Interviews – Security Review Magazine https://securityreviewmag.com 32 32 ManageEngine @ GISEC Global 2025: AI, Quantum Computing, and Ransomware Form Part of Cybersecurity Outlook for 2025 https://securityreviewmag.com/?p=28236 Mon, 12 May 2025 12:08:28 +0000 https://securityreviewmag.com/?p=28236 As AI-powered attacks and quantum computing reshape the cyber threat landscape, organizations must rethink traditional defense strategies. In an exclusive interview, Sujoy Banerjee, Associate Director at ManageEngine, reveals how businesses can prepare for 2025’s most critical threats—from AI-generated phishing scams to quantum-decrypted ransomware

What do you see as the most critical emerging cybersecurity threats in 2025, and how should organizations prepare for them?
Emerging technologies like AI and ML are disruptors leading to the rise of cyberattacks. AI-powered attacks are increasingly affecting businesses via phishing scams, ransomware attacks, malware attacks, and endpoint vulnerability exploitation. Organisations need to move beyond traditional defences to mitigate this risk. By investing in proactive measures, like penetration testing to uncover vulnerabilities, and using purple team exercises to simulate real-world attacks, organisations can improve their threat detection and response.

With threats targeting both on-premises systems and cloud environments, it’s crucial to secure all digital fronts. Companies must also run tailored incident response drills to stay ready for fast-moving threats. Ultimately, building a strong, adaptive cybersecurity strategy that accounts for AI-driven attacks is essential to protect digital assets and stay resilient in the face of evolving cyber risks.

How is the rise of AI and quantum computing reshaping the cybersecurity landscape, and what risks do they introduce?
As much as it is being hailed for making our lives easy, AI has also become a powerful ally for digital miscreants. In particular, threat actors are using generative AI (GenAI) to create highly convincing phishing emails, fake websites, and deepfakes for deceiving users and stealing their information. Threat actors are also using GenAI to develop sophisticated malware that bypasses traditional security defences.

Similarly, quantum computing is a double-edged sword. These powerful machines are capable of rendering traditional encryption methods obsolete, especially public key cryptography, as what once took a traditional computer years to decode RSA-2048 (a widely used encryption algorithm) takes a quantum computer a matter of seconds or minutes to decode.

How do you predict ransomware tactics will evolve in the near future, and what proactive measures should businesses take?
Threat actors are using AI to develop sophisticated, highly accurate ransomware that not only widens the reach of the attack but increases the impact on its victims. And this issue will only get worse as threat actors evolve their use of AI to carry out these attacks, drastically altering the threat landscape.

Businesses can adopt several key strategies to defend against ransomware attacks effectively. These include improving employee awareness and periodic training, restricting user access by implementing a Zero Trust approach and multi-factor authentication, taking regular data backups, keeping systems updated, and configuring the firewall to filter out suspicious activities and network segmentation to limit the spread of malware.

How does regulatory compliance (like UAE’s Data Protection Law or Saudi’s NCA requirements) impact cybersecurity strategies for regional businesses?
Governments across the region, led by the UAE and Saudi Arabia, have taken it upon themselves to enforce a safe and resilient cyberspace. This is in line with the region’s ongoing efforts to promote digital innovation, thereby delivering better services for people and driving faster economic growth. Compliance mandates, like Saudi Arabia’s and the UAE’s PDPL, play a major role in setting various polices, standards, and guidelines to safeguard the IT infrastructure in the respective countries. By incorporating these controls in their cybersecurity strategies, regional businesses can improve their security posture and protect their sensitive data. Failure to do so not only makes them vulnerable to cyberattacks, but invites substantial fines, legal action, and loss of operating license.

Can you explain ManageEngine’s “unified security” approach and how it simplifies cybersecurity for enterprises?
With over 20 years of experience in observing the changing IT landscape and building highly scalable and integrable solutions, ManageEngine recognises there is no single path to cyber resilience for enterprises. To stay ahead of both established and emerging threats, there is a need to take a holistic approach wherein identities, endpoints, and network infrastructure are all properly secured and governed. ManageEngine’s AI-powered cybersecurity solutions, all of which have been built from ground-up, effectively ensure this. They also help enterprises comply with the most important cybersecurity frameworks and data privacy regulations like the GDPR and the PDPL.

How does ManageEngine leverage AI to enhance phishing simulations and employee training?
For over a decade, we have been researching emerging technologies, resulting in the development of our own in-house AI based on contextual intelligence. We understand AI’s importance in detecting and mitigating cyberattacks. Our AI capabilities can be leveraged for a variety of security use cases, such as ransomware protection, anomaly detection, data exfiltration, and preventing insider access abuse.

Most phishing attacks are carried out via email, which lures an individual to download malware that enables the attacker to breach the user’s system and network. By relying on AI, our solutions can flag potential phishing attempts by continuously analysing emails and websites. This will enable security administrators to prioritise such threats and mitigate their impact.

]]>
Positive Technologies @ GISEC Global 2025: Demonstrating Cutting-Edge Cyber Threats and AI Defense Strategies https://securityreviewmag.com/?p=28233 Mon, 12 May 2025 11:51:35 +0000 https://securityreviewmag.com/?p=28233 At GISEC Global 2025, Positive Technologies showcased live demonstrations of sophisticated hacking techniques while emphasising the growing role of AI in both cyber attacks and defense. In an exclusive interview with Security Review, Ilya Leonov, the Regional Director at Positive Technologies revealed insights about the Middle East’s evolving threat landscape, their work with regional governments, and why investing in human expertise remains critical despite advancing technologies

Could you tell us about Positive Technologies’ presence at this year’s GISEC event and the solutions you’re showcasing?
This year at GISEC, we’re presenting our latest cybersecurity solutions with a strong focus on hands-on, practical expertise. At our stand, we’re demonstrating sophisticated attack techniques like direct memory access attacks and full injection attacks – these show just how easily devices like laptops can be compromised. We’ve also significantly expanded our Hackosphere area compared to last year, featuring interactive engagements including soldering, device hacking, fixed attacks, and stenography challenges. We’ve doubled the size of this interactive space and hope to see twice the engagement as well.

How does participating in this event help you engage with regional companies?
We’re seeing tremendous participation from across industries – government representatives, oil and gas companies, financial institutions, and many partners. GISEC has established itself as one of the most efficient and prominent cybersecurity events not just in the UAE, but across the entire Middle East region.

Could you share your observations about the current threat landscape in the region and how you’re helping companies address these challenges?
Through our Threat Research Center – the largest in Eastern Europe – we continuously monitor critical infrastructure and analyse activity across the deep and dark web globally. In the Middle East specifically, we’re observing significant activity from APT groups, including state-sponsored hackers and hacktivists targeting critical national infrastructure. Their methods typically involve compromising internal organisational systems or creating backdoors, which they often then sell access to on dark web markets.

What challenges are companies facing regarding AI-powered attacks?
AI is undoubtedly the hot topic in cybersecurity right now. While AI capabilities are becoming increasingly sophisticated and powerful, I firmly believe human expertise remains irreplaceable. That said, we’re seeing substantial AI integration from both sides – threat actors are leveraging it for attacks while cybersecurity professionals are using it for defense. This dual adoption is creating significant impacts, and we anticipate this trend will continue growing over the next 5-10 years.

Are you collaborating with any local entities or governments to address these AI-related security challenges?
Absolutely. We’re actively working with local partners, government agencies, and regional companies to help them understand the AI threat landscape and demonstrate how AI and machine learning can be effectively used to protect their infrastructure.

What key advice would you give regional organisations looking to improve their security posture?
My fundamental recommendation is to invest in human capital. Knowledge and expertise are assets you can’t simply purchase – they need to be developed. An organisation might have the best security tools and infrastructure, but without capable personnel, these resources become ineffective. This is why we emphasise sharing our expertise – not just in defense strategies, but in incident response, investigations, and most importantly, in building local capabilities to elevate overall cybersecurity maturity levels.

]]>
Group-IB @ GISEC Global 2025: Tackling Evolving Cyber Threats with Localised Intelligence and AI https://securityreviewmag.com/?p=28230 Mon, 12 May 2025 08:58:31 +0000 https://securityreviewmag.com/?p=28230 At this year’s GISEC Global, cybersecurity firm Group-IB showcased its expanding role in combating increasingly sophisticated cyber threats. In an exclusive interview with Security Review, Ashraf Koheil, the META Director of Business at Group-IB, discussed the company’s growing presence at GISEC, emerging cybercrime trends, and how their AI-powered threat intelligence platform is helping businesses and governments stay ahead of attackers

Could you give us a brief overview of Group-IB’s presence at GISEC and your solutions?
This is our fourth year we are participating in GISEC, and our involvement has grown significantly—both in terms of visibility and the solutions we offer. Group-IB is one of the few full-platform players in cybersecurity, specialising in active threat intelligence, digital risk protection, fraud prevention, and monitoring. Fraud, in particular, is a rapidly evolving threat—growing in complexity and impact.

Speaking of evolving threats, what key changes are you seeing in the cyber threat landscape, especially in this region?
We’ve observed several concerning trends. First, APT (Advanced Persistent Threat) attacks have become far more sophisticated, driven by global geopolitics. Data exfiltration and theft are rampant. Second, fraud attempts are now borderless, with threat actors sharing intelligence across borders. And third, AI is a double-edged sword—while we use it for threat detection, attackers are leveraging AI for phishing, social engineering, and automating malicious campaigns.

Your Cyber Crime Center has been a major focus. Can you elaborate on its role?
Absolutely. We take a localised, intelligence-driven approach, meaning we develop threat insights at both country and industry levels. This allows us to brief governments, law enforcement, banks, and critical infrastructure providers on targeted risks.

Additionally, our Cyber Crime Center integrates multiple data streams—threat intelligence, fraud analytics, phishing scams, and money laundering patterns—into a unified system. This gives clients a real-time, 360-degree view of their threat landscape, helping them build stronger cybersecurity strategies.

What’s your key message for companies and attendees at GISEC?
There are three main takeaways. Attendees should stay updated on emerging trends, as new vendors and tools are constantly entering the market. They should prioritise tailored intelligence over generic open-source data. And they should maximise ROI on existing security investments before adopting new solutions.

How does Group-IB support its channel partners?
We’re a partner-first organisation, and we’ve launched several initiatives, including a certification program that enables partners to build expertise around our technology. We also conduct partner engagement surveys to gather feedback and improve collaboration, and we emphasise deep interoperability with other security solutions.

Beyond that, we address three key areas: CISO-level security, CFO-focused fraud prevention, and brand protection—each with dedicated solutions tailored to different organisational needs.

]]>
Video: Wallarm Unveils the Key to Cloud-Native API Security at GISEC Global 2025 https://securityreviewmag.com/?p=28223 Sun, 11 May 2025 14:37:47 +0000 https://securityreviewmag.com/?p=28223 In this insightful interview, Ammar Affani, Regional Sales Director, META at Wallarm, unveils his company’s core value proposition: providing cutting-edge protection for modern cloud-native applications with a strong focus on API security, discovery, visibility, and control. Learn how Wallarm empowers organizations to identify API leaks, unused or shadow APIs, and gain comprehensive security insights. With the rise of open banking and interconnected services, Ammar highlights the increasing threat landscape targeting APIs. He further explains how Wallarm offers real-time detection and blocking to safeguard sensitive user credentials and ensure robust API protection:

]]>
Video: CyberKnight on Zero Trust, AI, and Saudi Arabia’s Digital Transformation at GISEC Global 2025 https://securityreviewmag.com/?p=28220 Sun, 11 May 2025 14:27:09 +0000 https://securityreviewmag.com/?p=28220 In this interview, Samir Omar, General Manager – Sales-KSA at CyberKnight reveals CyberKnight’s key focus at GISEC 2025: navigating the new era of cybersecurity with Zero Trust strategies and the integration of AI and AIOps. He explains how CyberKnight is helping customers implement true Zero Trust frameworks in this rapidly evolving landscape. Discover how CyberKnight is actively contributing to Saudi Arabia’s digital transformation, as Samir explains their role as a trusted advisor and enabler, working closely with customers to understand their mission, goals, and vision to help them achieve success:

]]>
Video: SANS Institute Weighs in on Deepfakes, Model Poisoning and Risk Frameworks at GISEC Global 2025 https://securityreviewmag.com/?p=28217 Sat, 10 May 2025 14:57:15 +0000 https://securityreviewmag.com/?p=28217 In this video, Rob T. Lee, Chief of Research at the SANS Institute discuses the biggest AI-related cybersecurity threats that organizations will face in 2025. He dissects adversarial AI attacks, such as model poisoning and deepfake phishing, and clearly explaining how these sophisticated threats differ significantly from traditional cyber attacks.

Deploying AI without a security-first mindset can be perilous and Rob outlines the significant risks enterprises face if they implement AI without proper security safeguards in place. Navigating this new terrain requires a strategic approach, as Rob touches upon what a “risk-based” AI security framework looks like and provides actionable steps on how organizations should begin building one to protect their AI deployments:

]]>
Video: SentinelOne Speaks Hyperautomation, Purple AI, and the Future of Threat Detection at GISEC Global 2025 https://securityreviewmag.com/?p=28213 Sat, 10 May 2025 14:40:54 +0000 https://securityreviewmag.com/?p=28213 Ezzeldin Hussein, Regional Senior Director, Solution Engineering, META, SentinelOne joined us for a fascinating chat! In this video, we dove deep into how SentinelOne’s Singularity Hyperautomation is revolutionising security operations. Discover what makes SentinelOne’s Purple AI different and a TRUE game-changer, and witness how AI is enabling instant real-time threat detection and action. Learn how AI boosts accuracy and silences the noise. Finally, get Ezzeldin’s predictions for the next 5 years of AI-powered security:

]]>
Video: Tenable Discusses Strategies for Smarter Security and OT Protection at GISEC Global 2025 https://securityreviewmag.com/?p=28210 Sat, 10 May 2025 14:14:13 +0000 https://securityreviewmag.com/?p=28210 Bernard Montel, EMEA Technical Director and Security Strategist at Tenable, spoke to us at GISEC Global 2025! He highlighted Tenable’s latest cybersecurity solutions and vulnerability intelligence, showing how they improve risk prioritisation. We discussed the rising importance of OT security in the Middle East, AI’s impact on ransomware defense, challenges in securing legacy OT, and Tenable’s exploration of generative AI for threat detection and more:

]]>
Video: OPSWAT Rethinks Firewalls and Gulf Cybersecurity at GISEC Global 2025 https://securityreviewmag.com/?p=28205 Fri, 09 May 2025 14:43:16 +0000 https://securityreviewmag.com/?p=28205 OPSWAT CEO Benny Czarny joins us at GISEC Global 2025! He explains why the event is key for OPSWAT and previews their latest solutions. Benny also argues for a firewall rethink, highlighting traditional vulnerabilities and OPSWAT’s unique network protection approach. We also discuss the cybersecurity risks and opportunities of rapid digital transformation in Gulf countries and why the Middle East’s critical infrastructure is particularly vulnerable today. Tune in for crucial insights:

]]>
Video: Check Point Unlocks the Middle East’s Cyber Defense Strategies https://securityreviewmag.com/?p=28202 Fri, 09 May 2025 11:31:15 +0000 https://securityreviewmag.com/?p=28202 Uncover the Middle East’s cybersecurity secrets with Ram Narayanan, Country Manager at Check Point, at GISEC Global 2025! We dive into their highlighted solutions tackling regional threats, the power of their Hybrid Mesh Architecture, and why Check Point is doubling down on the Middle East with big investment and expansion plans. Plus, learn how they’re securing critical UAE infrastructure and boosting engagement with partners and customers. Don’t miss these key insights:

]]>