Security – Security Review Magazine https://securityreviewmag.com We bring you the latest from the IT and physical security industry in the Middle East and Africa region. Tue, 10 Dec 2024 06:58:00 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://securityreviewmag.com/wp-content/uploads/2024/08/cropped-SRico-32x32.png Security – Security Review Magazine https://securityreviewmag.com 32 32 Here’s How Smart Devices are Eroding Privacy and Security https://securityreviewmag.com/?p=27518 Tue, 10 Dec 2024 06:58:00 +0000 https://securityreviewmag.com/?p=27518 Privacy is generally held as a fundamental right, with citizens often having high expectations regarding the protection of their personal information. Citizens protest when they fear that governments are increasing their involvement in the citizens’ personal lives. However, they don’t consider how much personal and sensitive data they share with any application that they install on their smartphone, or with smart devices in their homes.

Big tech companies and vendors of personal devices such as wearables, smartphones, and voice assistants collect intimate details about their users—often far more than any healthcare provider or government agency. These devices capture data on physical health (like heart rate, sleep patterns, and physical activity), mental well-being (through analysis of speech, facial expressions, and online activity), and personal preferences, including what we search for, buy, or listen to. Voice assistants continuously learn from user interactions, building profiles that can include details about routines, relationships, and even moods, inferred from voice tone and language.

This data extends beyond what any individual doctor could know, compiling a digital “fingerprint” of personal health and behaviour. For instance, wearables record heart rate, stress levels, and steps taken, creating a comprehensive record of the wearer’s physical and mental state. Online Platforms use sophisticated algorithms to understand users’ interests and behaviours better than many friends or family members might, mapping out everything from buying habits to political views.

These companies achieve such depth by aggregating data across devices, apps, and digital environments. The insights generated are not just for providing services but are also used in targeted advertising and can be shared with third parties or government entities under certain conditions, sometimes without users’ explicit knowledge.

Applications must request consent and permission to ask for sensors in your device, and usually, users easily give it. While this data has immense value for improving products and personalizing services, it raises significant privacy concerns because it operates largely without oversight, allowing tech companies to wield unprecedented insight into the intimate details of billions of lives.

In 2018, we learned about the Facebook and Cambridge Analytica scandal. In short, a consulting firm harvested personal data from millions of users without their consent. The data was used to build psychological profiles of users, which were then leveraged to deliver targeted political advertisements. The major concern was data monetization, ad profiling and targeted campaigns.
The discussion has escalated since then, and it is now around homeland security, influence campaigns, and espionage by foreign governments.

Privacy and cultural differences
A current public debate surrounds data collection practices by popular social media and technology companies. Investigations revealed that such apps gather extensive user data, including location, contacts, and behavioural data, raising concerns about data security and potential access by foreign governments. While these companies deny any unlawful access, governments have imposed strict oversight measures to ensure that sensitive user information is not compromised. This has sparked action worldwide, as countries prioritize data security for their citizens.

Smartphone and IoT device manufacturers from various regions are also under scrutiny. Concerns have been raised about the risk of foreign governments accessing user data through backdoors or other surveillance mechanisms. This issue is particularly prominent in countries with different approaches to data privacy, especially in authoritarian regimes that prioritise state control over individual privacy. These practices have led to heightened concerns over the potential misuse of devices for espionage or surveillance.

How Governments are Responding
Privacy Laws in Western countries exemplify this commitment to data privacy by giving individuals control over their data and requiring transparency from companies about data collection and sharing practices. Such frameworks are influenced by cultural values that prioritise individual freedoms and a deep-seated aversion to surveillance, especially in the private domain of one’s home.

This divergence not only shapes local privacy standards but also impacts international relations and the global IoT market. Democracies are increasingly implementing policies to restrict foreign-made devices suspected of being vulnerable to government interference, reinforcing the broader geopolitical contest between open and closed data governance models.

As these cases demonstrate, the threat is not hypothetical. Governments worldwide are actively grappling with the security and privacy implications posed by IoT devices, particularly from vendors with potential ties to state surveillance. In response, several regulatory and legal actions are underway:

  1. Bans and Restrictions on High-Risk Vendors: Select governments have taken action by banning specific foreign-made devices from critical infrastructure, particularly in government buildings and other sensitive areas. This approach, while controversial, is perceived as a necessary step to reduce the risk of espionage.
  2. Data Protection and Privacy Laws: The European GDPR and similar laws around the world are designed to give consumers more control over their data. These regulations require that companies provide clear consent options, disclose data usage, and allow users to manage the data collected by their devices. However, enforcing these laws on foreign companies remains a challenge. Therefore, in Europe, the commission approved last month the new extended Cyber Resilience Act (CRA), which demands manufacturers to comply with both privacy and security requirements in any connected device, if they want to sell them in the European market.
  3. Device Security Standards: Several countries have introduced laws mandating minimum security standards for devices used by government agencies. These laws encourage basic security measures like banning default passwords, thereby reducing the risk of unauthorized access.

The privacy breach incidents highlight the urgent need for stronger regulations and better consumer awareness of potential security threats. This story is not just about one family or a single breach; it’s a broader narrative of how the “smart” devices in our homes could, in the wrong hands, compromise our privacy and security. As governments, regulatory bodies, and consumers begin to navigate this new reality, collaboration and vigilance will be key to preserving the sanctity of our private spaces.

]]>
Evanssion Partners With HackerOne to Bring Human-Powered Security to the Middle East https://securityreviewmag.com/?p=27300 Fri, 25 Oct 2024 06:54:16 +0000 https://securityreviewmag.com/?p=27300 Evanssion has announced its partnership with HackerOne to increase the adoption of the bug bounty, Pentest, and vulnerability disclosure programs across Middle Eastern enterprises. Customers can now leverage human ingenuity to pinpoint the most critical security flaws across their attack surfaces to get ahead of cybercriminals. A recent report highlights an unprecedented surge in cyberattacks across the Middle East, with a 17% increase in 2023, especially targeting critical sectors like finance, energy, and government.

As the region experiences rapid digital transformation, organizations are becoming prime targets for ransomware attacks and sensitive data breaches. Human-powered security platforms, such as HackerOne, leverage the skills of ethical hackers worldwide to offer proactive vulnerability detection that is 35% more cost-effective compared to traditional vulnerability management methods.

HackerOne is a leading provider of human-powered security solutions, with 61% of customers identifying more vulnerabilities when compared with traditional vendors. 22.75% of valid vulnerabilities surfaced in a bug bounty are high or critical, compared to less than 1% found by automated scanners, and 18% of its Pentest findings rated as high or critical severity—nearly double the industry average, demonstrating HackerOne’s exceptional ability to identify and address serious security risks.

“At Evanssion, we remain focused on enabling enterprises to enhance their cybersecurity strategies, and our partnership with HackerOne is both strategic and timely. With our deep regional expertise paired with HackerOne’s global leadership in Human-Powered Security, we are excited to be able to provide substantial value to our partners and customers in the Middle East,” said Navneeth Ramanan, COO of Evanssion.

“Evanssion’s customers across the Middle East can now easily access the creative insights of the global security researcher community to build their security resilience,” said John Addeo, VP of Partnership Sales at HackerOne. “Evanssion’s deep understanding of the region and its customers’ unique challenges makes it an ideal partner for HackerOne to extend our solutions to leading companies in the Middle East.”

]]>
Proofpoint Sets New Standard for Human-Centric Security https://securityreviewmag.com/?p=27146 Wed, 11 Sep 2024 07:47:33 +0000 https://securityreviewmag.com/?p=27146 Proofpoint has announced expanded capabilities across its award-winning platform to provide customers with broader, adaptive human-centric security controls. These new solutions and integrations shield organizations from incoming threats across messaging, collaboration and social media apps; secure SaaS applications and identity posture across a vast array of applications; prevent data loss with smarter, more adaptive data security; and steer employees to safer behaviours through adaptive educational security guidance.

Announced today at the company’s flagship Protect conference, these new capabilities set a new standard for how organizations address human risk, by leveraging two key proprietary platform elements: Proofpoint Nexus, an AI, behavioural, and threat detection ensemble that identifies and mitigates risk; and Proofpoint Zen, a set of technologies that deliver world-class, comprehensive protection as people work with email, collaboration apps, the web, and data. Together, they provide an integrated, cohesive experience that brings human-centric protection to end users and security professionals alike.

“From ransomware to Business Email Compromise to data loss, the most damaging cyber risks all centre around humans and their identities,” said Sumit Dhawan, chief executive officer, Proofpoint. “But human risk is difficult to tackle as we all work across email, collaboration apps, the cloud, and the web, creating threat risk, identity sprawl, and data exposure in new ways. Proofpoint pioneered human-centric security, and now we’re redefining it by bringing together previously disparate processes and technologies into one unified platform to protect new digital channels, reduce risk for organizations, and better guide users in real-time, every day.”

Threat actors are increasingly using digital channels such as Slack, Microsoft Teams, Zoom, and LinkedIn to launch phishing attacks, tricking people into divulging personal information or performing certain actions, such as transferring money or revealing sensitive company data. Over the past three years, URL threats delivered by email have increased 119% and those delivered by SMS have skyrocketed by 2,524% according to Proofpoint data.

Powered by industry-leading threat intelligence and Proofpoint’s new ZenWeb browser extension, Proofpoint Collab Protection provides real-time advanced threat protection to block malicious URLs delivered in any messaging, collaboration or social media application and can be deployed across Google Chrome, Microsoft Edge, Apple Safari or any Chromium-based enterprise browser. Leveraging Nexus TI (Threat Intelligence), customers benefit from the collective defences that protect a network of thousands of the most critical organizations around the world.

While corporate identities empower employees to work with ease across Microsoft 365, GenAI, cloud storage and collaboration applications, threat actors have also learned to exploit them to launch ransomware attacks, hijack cloud accounts, and exfiltrate data. According to Proofpoint data, nearly all (96%) organizations have been targeted for cloud account takeover, and more than half have experienced it firsthand. Further, half of all hijacked accounts had multifactor authentication (MFA) enabled, demonstrating how unsecured applications—both enterprise-provided and shadow applications—are valuable stepping stones for attackers to take over corporate cloud accounts.

Proofpoint Nexus maps user identity sprawl and common attack paths and detects configuration and access anomalies to prevent unauthorized access and cloud account takeover; this helps security practitioners understand where an account is located and whether it creates risk due to its privilege, the data it’s linked to, or how well (or how poorly) its security is configured. Based on the posture and risk of an identity, Proofpoint Posture Management makes recommendations and performs configurations to improve it.

Identifying insider threats is a challenge, making internal investigations reactive: cybersecurity administrators concentrate on high-risk users, such as departing employees, those on a performance improvement plan, or contractors, only after being alerted to their potential risk to the company. Proofpoint’s Adaptive Information Protection empowers security teams to take a proactive approach to managing insider risks, shifting the responsibility of the security analyst from building manual policies to automating responses to a user’s risky behaviour. That, in turn, helps analysts work more efficiently.

Further, as GenAI tools have become pervasive in the workplace to accomplish tasks like summarizing meeting transcripts, rewording emails or writing code, careless or unintentional actions can expose business-critical information such as PII, source code and other corporate information. Some of this information is difficult to identify and protect using legacy DLP tools. Proofpoint’s new intent-aware GenAI protection and GenAI prompt redaction help organizations enable GenAI use while protecting both structured and unstructured organizational data from being overshared. It educates end users and guides behaviour change via compliance notifications when interacting with GenAI tools.

Traditional compliance-driven security awareness programs are not effective at mitigating human risk and guiding employees toward safer behaviours. In fact, research shows most employees (68%) knowingly engage in risky behaviours despite 99% of organizations having a security awareness program. Proofpoint is evolving its security awareness solution to empower organizations to reduce security incidents by cultivating real behavioural change and building a strong security culture.

Proofpoint’s ZenGuide (formerly Proofpoint Security Awareness Training) enables lean security teams to automate and scale personalized learning paths based on an individual’s unique risk profile, behaviours and role. It uses people-risk insights across the Proofpoint ecosystem to deliver relevant interventions that build security champions and reduce risky behaviours, enabling organizations to move beyond compliance-driven programs and provide targeted, context-awareness education that addresses specific risks and behaviours.

Proofpoint’s new platform capabilities will be showcased during Proofpoint’s ‘Protect’ event series, which begins today in New York City. Proofpoint’s Collab Protection is expected to be available globally in the first half of 2025. Proofpoint’s Posture Management is expected to be available globally in Q1 2025. Proofpoint’s new Adaptive Information Protection is expected to be available in September 2024. Proofpoint’s new extended GenAI protections are expected to be available in Q1 2025. Proofpoint’s ZenGuide is currently available globally, with the new employee engagement features arriving in Q1 2025.

]]>
CyberKnight Brings Advanced App Security to the Middle East with Digital.ai https://securityreviewmag.com/?p=27103 Wed, 28 Aug 2024 07:40:37 +0000 https://securityreviewmag.com/?p=27103 Organizations are fast adopting DevOps practices to enable faster delivery of customer value and agility at scale. However, security has often been viewed as a problem to fix later and not a requirement to factor into the pipeline, making it difficult to ensure that infrastructure and environments meet security and regulatory requirements without sacrificing speed. According to Gartner, “by 2027, DevSecOps practices will be embedded in 85% of product development teams, as opposed to 30% in 2022”.

To support enterprise and government organizations across the Middle East, Turkey and Africa (META) to better automate software releases, improve mobile application testing and security, and gain insights across the software lifecycle, CyberKnight has become a distributor-partner of Digital.ai Software, Inc. (Digital.ai), an industry-leading technology company dedicated to helping enterprises automate software delivery workflows across complex technology environments.

Digitial.ai’s renowned AI-powered DevSecOps platform automates software releases, improves mobile application testing and security, and provides insights across the software lifecycle. The platform offers unparalleled capabilities in securing mobile, web, and desktop applications, making it a crucial tool for enterprises looking to safeguard their digital assets. Its DevOps and DevSecOps orchestration tools further streamline and automate the development process, allowing security to be embedded at every stage without compromising speed or agility.

“With the increasing demand for secure, high-performance applications in the region, this collaboration is set to address the critical need for end-to-end application security, from development to deployment and beyond. Joining forces with Digital.ai aligns perfectly with our mission to bring cutting-edge cybersecurity solutions to the META market. As part of the partnership, CyberKnight will leverage its extensive regional expertise and channel network to bring Digital.ai’s innovative solutions to our clients,” commented Wael Jaber, CSO at CyberKnight.

“Specialized attacks like modified or malicious code changes saw double-digit growth YoY, with surging use of AI/ML contributing to the increase in attacks. The partnership with CyberKnight comes at a pivotal time as the Middle East and Africa continue to experience rapid digital transformation, with an increasing emphasis on secure application development. Through this collaboration, Digital.ai aims to provide organizations with the tools they need to protect their digital assets and accelerate their DevOps and DevSecOps initiatives,” commented Mike Woodard, Vice President, Product Management at Digital.ai.

]]>
Qualys Intros AI-Powered Web Application Scanning (WAS) with API Security https://securityreviewmag.com/?p=26990 Tue, 30 Jul 2024 03:04:06 +0000 https://securityreviewmag.com/?p=26990 Qualys has announced the launch of its API security platform that leverages AI-powered scanning and deep learning-based web malware detection to secure web apps and APIs across the entire attack surface, including on-premises web servers, databases, hybrid, multi-cloud environments, API gateways, containerized architectures, and microservices.

APIs are integral to digital transformation initiatives across industries. The latest data indicates that over 83% of web traffic now comprises API traffic, highlighting their critical role in modern web applications using microservices, cloud, and hybrid environments. However, this also underscores the vulnerabilities that accompany their widespread adoption.

“Many organizations use a variety of security tools, such as SAST, DAST, SCA, or point solutions for API security that often operate in isolation, without a unified platform to integrate their findings. Moreover, the absence of integration between these tools leads to a fragmented view of the application security posture and results in uncoordinated efforts and gaps in security coverage. Similarly, SAST & DAST tools offer limited coverage for API-specific issues and focus predominantly on code vulnerabilities,” commented Kunal Modasiya, Vice President, Product Management, CyberSecurity Asset Management, Qualys. “Mainly, these solutions fail to extend their assessment to the runtime or environmental threats where APIs operate and provide visibility into the vulnerabilities of the underlying infrastructure hosting these APIs, leaving significant security gaps at the network and host levels.”

Qualys API security addresses and allows organizations to:

  1. Measure API risks across all attack surfaces with a unified view of API security by discovering & monitoring every API asset across diverse environments, enabling better decision-making and faster response times.
  2. Communicate API risks like OWASP API Top 10 vulnerabilities & drift from OpenAPI specs with real-time threat detection and response, minimizing the risk window and enhancing overall security.
  3. Eliminate API risks with integrated workflows supporting Shift-Left & Shift-Right practices, bridging the gap between IT and security teams, promoting seamless collaboration, and improving operational efficiency.

Key features of Qualys API

  1. Comprehensive API discovery and inventory management
    Qualys WAS with API Security automatically identifies and catalogues all APIs within an organization’s network, including internal, external, undocumented, rogue, and shadow APIs. Whether APIs are deployed in multi-cloud environments (AWS, Azure), containerized architectures (Kubernetes), or API gateways (Apigee, Mulesoft), Qualys’ continuous discovery ensures an updated inventory across all platforms, preventing unauthorized access points and shadow APIs.
  2. API vulnerability testing & AI-powered scanning
    Qualys provides comprehensive API vulnerability testing using 200+ prebuilt signatures to detect API-specific security vulnerabilities, including those listed in the OWASP API Top 10, such as rate limiting, authentication & authorization issues, PII collection, and sensitive data exposure. Moreover, for large applications, Qualys combines the power of deep learning and AI-assisted clustering to perform efficient vulnerability scans. This smart clustering mechanism targets critical areas, achieving a 96% detection rate with an 80% reduction in scan time.
  3. API compliance monitoring
    Qualys performs both active and passive compliance monitoring to identify and address any drift or inconsistencies in API implementation and documentation in adherence to the OpenAPI Specification (OAS v3). Clear, standardized API documentation, in adherence to OAS, ensures that shared documentation is easily understood by recipients, simplifies security assessments and enforcement, and enhances the accuracy of code, benefiting both automated tools and human developers. Qualys also continuously monitors APIs for compliance with industry standards such as PCI-DSS, GDPR, and HIPAA to ensure that APIs remain compliant with evolving regulations, avoiding potential fines and enhancing data protection.
  4. API risk prioritization with TruRisk
    Qualys leverages its proprietary TruRisk scoring system, which integrates multiple factors such as severity, exploitability, business context, and asset criticality to prioritize risks based on overall business impact, ensuring that the most critical vulnerabilities are addressed first. It also categorizes risks based on the OWASP API Top 10, helping organizations focus on the most prevalent and severe API security threats.
  5. Seamless integration with Shift-Left and Shift-Right workflows
    Qualys integrates seamlessly with existing CI/CD tools (e.g., Bamboo, TeamCity, Github, Jenkins, Azure DevOps) and IT ticketing systems (e.g., Jira, ServiceNow), supporting both shift-left and shift-right security practices. This facilitates automated security testing and real-time threat detection and response without disrupting development workflows. By bridging the gaps between IT and security teams, Qualys ensures smoother operational transitions, improving API security practices and reducing the risk window.
]]>
CyberKnight Launches New OT/IoT Security Unit and Announces TXOne Partnership https://securityreviewmag.com/?p=26658 Wed, 24 Apr 2024 13:08:00 +0000 https://securityreviewmag.com/?p=26658 CyberKnight has announced that it has become a value-added distributor for TXOne Networks. “TXOne ensures the reliability and safety of industrial control systems and operational technology environments; the company’s OT-native network segmentation and defence technologies enable organizations to mitigate the impact of cyberattacks. Based on the ‘OT Zero Trust’ principle, TXOne adapts to the unique characteristics of each OT environment, to deliver cybersecurity solutions that support secure production operations,” the company said.

During GISEC 2024, CyberKnight also unveiled its dedicated Zero Trust OT/IoT Security business unit, in which TXOne will reside. This specialized unit will focus on developing and delivering tailored solutions designed to address the unique cybersecurity challenges faced by organizations operating in OT/ICS environments, or with significant IoT assets. Other than TXOne, the Business Unit will also include Xage and Phosphorus, with new vendors coming soon.

“With IoT and digital transformation accelerating convergence across OT and IT environments, cyberattacks can now cause major operational disruptions, economic loss and even risk to human safety. TXOne Networks offers our customers leading OT-native all-terrain cybersecurity solutions that ensure the reliability and safety of ICS environments via the OT Zero Trust methodology. Through our partnership with TXOne Networks and the launch of our Zero Trust OT/IoT Security business unit, we are well-positioned to empower our clients with advanced solutions that protect their critical assets and operations from cyber threats,” commented Amr Elsayed, OT/IoT Business Unit Head, at CyberKnight.

“We are very excited to join forces with CyberKnight on our mission to maintain the stability and security of our customers’ OT environments in the region. We are proud to continue our expansion in the region and offer our platform that meets the unique needs of diverse ICS verticals in device inspection, endpoint protection, and network defence to secure organizations’ OT workforce, workload, and workplace. This partnership with CyberKnight, allows us to leverage their regional coverage, channel breadth, deep-rooted customer relationships, and cybersecurity expertise to accelerate our growth,” added Sami Ayyoub, Director MEA, at TXOne Networks.

]]>
Microsoft Showcases AI for Secure Digital Transformation at GISEC 2024 https://securityreviewmag.com/?p=26646 Tue, 23 Apr 2024 11:37:40 +0000 https://securityreviewmag.com/?p=26646 Microsoft is showcasing its commitment to leveraging the power of AI to empower digital transformation journeys while ensuring cyber resilience at GISEC 2024. “The AI revolution has been remarkable and exciting to witness, but it has also presented a growing amount of risk,” said Naim Yazbeck, General Manager of Microsoft UAE. “Increasingly, we are seeing attackers launch highly sophisticated cyberattacks, making it imperative for organizations to bolster their cybersecurity defences and stay vigilant to safeguard sensitive data and maintain operational resilience. At Microsoft, we believe that innovation in AI-powered cyber defence can help reverse the current rising tide of cyberattacks. We are committed to building an AI-based cyber shield that will protect customers and countries around the world, and at GISEC Global 2024, we are showcasing how our comprehensive portfolio of security solutions can achieve that while helping organizations stay ahead of evolving threats.”

Microsoft’s Hub at GISEC Global 2024 consists of a VIP Demo Area, a Surface Zone, a Glambot Activation, a Networking Area, and a Food & Beverage Area. The company is demonstrating alongside nine partners, including QuorumCyber, Trustwave, Wizard Group, 42Crunch, BPS, Commvault, Fortinet, Rubrik, and Github.

At the heart of Microsoft’s showcase is Copilot for Security, the industry’s first generative AI solution designed to help security and IT professionals protect their organizations at the speed and scale of AI while remaining compliant with responsible AI principles. Made generally available on April 1, 2024, users can ask Copilot for Security questions in natural language and receive actionable responses to common security and IT tasks in seconds.

Ahmad El Dandachi, Enterprise Commercial Director at Microsoft UAE, commented “AI greatly enhances our ability to detect and defeat cyberattacks. With Copilot for Security, we are shifting the balance of power by empowering defenders to optimize their defence approach and turn hours and days spent digging through data into minutes of quick analysis and strategic decision-making. The solution is informed by large-scale data and threat intelligence, including more than 78 trillion security signals processed by Microsoft each day, and coupled with large language models to deliver tailored insights and guide the next steps. With Copilot, security teams can confidently lead their organizations into the age of AI.”

In addition to Copliot for Security, Microsoft is also demonstrating Microsoft Defender, Sentinel, Purview, Entra, Priva, Intune, and other innovations designed to advance cybersecurity protection for organizations. All of Microsoft’s solutions are backed by the company’s aggressive commitment to responsible AI development, underpinned by its Responsible AI principles used to develop and deploy every solution.

GISEC Global 2024 is set to attract more than 20,000 attendees from over 130 countries to the Dubai World Trade Center. Taking place until April 25th, the event provides a platform for more than 750 brands to showcase their innovations.

]]>
SentinelOne to Show Off AI-Powered Security Solutions at GISEC 2024 https://securityreviewmag.com/?p=26592 Wed, 17 Apr 2024 12:49:37 +0000 https://securityreviewmag.com/?p=26592 Meriam El Ouazzani, the Regional Director for Middle East, Turkey and Africa at SentinelOne, says the shortage of cybersecurity experts remains a big problem for companies globally

Tell us about the cybersecurity trends for 2024.
In 2024, cybersecurity trends include the increased adoption of AI-powered security solutions, the growing importance of cloud security, and the continued emphasis on cybersecurity awareness and education. GenAI-powered defences spotlight an increased reliance on AI and ML for threat detection and response, enabling quicker identification and mitigation of sophisticated attacks. Adaptive strategies to combat emerging threats like GenAI-driven attacks, deepfakes, and sophisticated ransomware tactics underscore the agile response required in the evolving threat landscape.

The adoption of Zero Trust Architecture is growing, and we are noticing a wider adoption of XDR platforms integrating multiple security controls to facilitate holistic threat detection and response across diverse environments. Moreover, the focus on cyber insurance is rising as businesses recognize the financial implications of cyber incidents and seek protection, aligning with the boost in regulatory compliance and supply chain security to tackle interconnected ecosystem and data privacy threats.

What is the theme of your participation at GISEC 2024?
The theme of our participation at GISEC 2024 revolves around “Empowering Cybersecurity with AI Innovation.” We aim to showcase how our AI-driven cybersecurity platform is revolutionizing the industry by offering advanced threat detection, real-time response capabilities, and enterprise-wide protection. Through our participation, we seek to demonstrate how AI technology can enhance cyber resilience, streamline security operations, and empower organizations to stay ahead of evolving threats in today’s digital landscape.

Which products and solutions will you be showcasing at GISEC 2024?
At GISEC 2024, we will be showcasing Purple AI, an AI security analyst which empowers organizations to identify threats earlier, respond faster, and stay ahead of attacks. We will also display our flagship Singularity Platform, including Singularity for Identity, Singularity Cloud Workload Security, and the Singularity Data Lake.

How are you equipped to help companies overcome digital security and privacy challenges?
We are equipped to help companies overcome digital security and privacy challenges through our innovative AI-driven cybersecurity solutions. SentinelOne’s AI-powered cybersecurity platform offers comprehensive protection across the entire enterprise ecosystem, from endpoints to the cloud. It breaks down security silos, providing enterprise-wide visibility and control, all driven by real-time AI.

Additionally, our Singularity Cloud Workload Security extends security and visibility across VMs, servers, containers, and Kubernetes clusters in hybrid cloud environments. By preventing, detecting, investigating, and responding to runtime threats in real-time, organizations can safeguard their data across public clouds, private clouds, and on-premise data centres seamlessly. Singularity for Identity empowers organizations to elevate their threat detection and response capabilities for identity-based surfaces, such as Active Directory and Azure AD.

With proactive, real-time defence mechanisms, SentinelOne ensures the integrity of identity infrastructure and credentials, mitigating cyber risks effectively. By harnessing the power of AI, we enable organizations to adapt and respond to evolving cyber threats in real time, empowering them to proactively defend against sophisticated attacks and minimize the impact of security incidents.

Is there a skills gap in the cybersecurity industry? What needs to be done to bridge that gap?
Yes, the shortage of cybersecurity experts remains a big problem for companies globally, as there aren’t enough skilled professionals to meet the demand. To tackle this, companies should focus on and invest in training, certifications, and apprenticeships to develop and retain a talented cybersecurity team. It’s also crucial to prioritize diversity and inclusion in hiring and retaining underrepresented groups to bridge the skills gap effectively.

]]>
Nozomi Networks Launches SaaS Platform for OT and IoT Security in UAE https://securityreviewmag.com/?p=26504 Wed, 20 Mar 2024 07:06:10 +0000 https://securityreviewmag.com/?p=26504 Nozomi Networks has introduced a significant expansion of its global cloud footprint with the launch of a new Vantage region in the United Arab Emirates – part of Nozomi Networks’ continued commitment to the UAE and the Middle East. Nozomi Vantage is a cloud-based cybersecurity management platform that provides critical infrastructure operators and cybersecurity teams with unified OT/IoT security monitoring and risk management across the Nozomi cybersecurity platform. Through a single pane of glass, Vantage powers asset management, vulnerability assessment, and threat detection and response.

A valuable resource in supporting the UAE’s Cyber Security Strategy to accelerate digital transformation and smarty city initiatives, Vantage delivers the unmatched security and visibility expected from Nozomi Networks, with the addition of unlimited scalability, powered by SaaS. It makes it possible to protect any number of OT, IoT, IT, edge and cloud assets, located anywhere, with a single platform.

“We are very excited to be able to better serve our customers in UAE with this new Vantage region,” said Bachir Moussa, Nozomi’s Regional Vice President for MEA. “Nozomi Networks has always been committed to strengthening critical infrastructure cybersecurity in the Middle East and this new Vantage region is a testament to that commitment. Now our customers can not only reap the benefits of a cloud-based solution, but they will also be able to leverage Nozomi’s latest cybersecurity defenses for the best possible protection.”

]]>
Intersec 2024 Focuses on ChatGPT’s Security and User Safety Measures https://securityreviewmag.com/?p=26334 Wed, 17 Jan 2024 08:03:53 +0000 https://securityreviewmag.com/?p=26334 At the Intersec 2024 Cyber Security Conference, held at the Dubai World Trade Centre and organized by the UAE Cyber Security Council, experts examined the intricate security risks and governance challenges that come with the broad use of Generative AI technologies like ChatGPT in the UAE and Middle East.

Gartner has identified privacy, confidentiality, and cyber fraud as the main risks associated with ChatGPT in the security data landscape. It was noted that information fed into ChatGPT could potentially be incorporated into its training data if chat histories are not erased.

The conference highlighted the current governance and regulatory framework in the UAE and the Middle East, with a focus on the UAE’s National Strategy for AI 2031. The strategy’s governance goals aim to bolster cybersecurity measures in AI applications, and relevant regional policies and initiatives were extensively discussed.

During the conference, Faheem Siddiqui, Group Director – Information Security, Majid Al Futtaim, said: “It is imperative for organisations to not only understand the security risks inherent in adopting Generative AI but also proactively establish robust compliance frameworks. The convergence of technical innovation, ethical considerations, and regulatory alignment is pivotal in cultivating an accountable and transparent AI landscape in the Middle East.”

As host of the Cyber Security Conference, His Excellency Dr Mohamed Al Kuwaiti, Head of the UAE Cyber Security Council, said: “Intersec celebrates a major milestone in 2024 and the UAE Cyber Security Council is proud to support efforts to develop and further grow cyber awareness across the global security sectors at the 25th edition of the show. Hosting the 3rd annual Cyber Security Conference, The UAE Cyber Security Council works closely with the show team to deliver new and innovative content areas, awareness sessions, and workshops, along with encouraging start-ups to flourish in cyberspace. We look forward to our continued growth and strategic partnership with Messe Frankfurt Middle East and Intersec.’

Aside from the conference, Intersec 2024 welcomes 34 cyber security exhibitors, a 10% increase from the 2023 edition of the show, each showcasing industry-specific solutions, including the Cyber Security Council, Fortinet, Alpha Data, Cisco, Morohub, Dell, Malcrove and Manage Engine.

A notable feature of Intersec 2024, In{cyber}, is dedicated exclusively to cybersecurity, presenting cutting-edge solutions and fostering connections among global experts and innovators.

Grant Tuchten, Portfolio Director at Intersec organiser Messe Frankfurt Middle East, said, “in{:cyber} 2024 is an extraordinary initiative at Intersec 2024, supported by the esteemed UAE Cyber Security Council. This groundbreaking event is a convergence point for top cybersecurity companies, CISOs, and cyber professionals, fostering collaborations and sparking discussions on cutting-edge trends. Our unwavering commitment to fortifying digital security propels us towards transformative opportunities, safeguarding the UAE’s digital landscape and extending our impact globally.”

Also at in{:cyber} 2024, the purpose-built Future Defenders Hack Arena, hosted by Malcrove CTF.ae, caters to various groups, from school students to CISOs, allowing participants to showcase their expertise across diverse cybersecurity domains, including web exploitation, digital forensics, cryptography, exploit development, and reverse engineering.

Powered by Unipreneur Inc, the Intersec Innovators Arena (IIA) provides a space for SMEs to showcase products to potential investors and offers a rich conference programme covering topics such as the role of startups in cyber security development and enhancing employment and emaratisation in the cyber security industry.

Held under the patronage of His Highness Sheikh Mansoor Bin Mohammed bin Rashid Al Maktoum, this milestone edition of Intersec celebrates a quarter-century of innovation in security technology with an estimated 45,000 visitors and 1,050 local and international exhibiting companies. The event focuses on tailored solutions for various sectors, including Commercial & Perimeter Security, Homeland Security & Policing, Fire & Rescue, Safety & Health, and Cyber Security, promoting innovation and connectivity across industries.

]]>