SentinelOne – Security Review Magazine https://securityreviewmag.com We bring you the latest from the IT and physical security industry in the Middle East and Africa region. Sat, 10 May 2025 14:40:54 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://securityreviewmag.com/wp-content/uploads/2024/08/cropped-SRico-32x32.png SentinelOne – Security Review Magazine https://securityreviewmag.com 32 32 Video: SentinelOne Speaks Hyperautomation, Purple AI, and the Future of Threat Detection at GISEC Global 2025 https://securityreviewmag.com/?p=28213 Sat, 10 May 2025 14:40:54 +0000 https://securityreviewmag.com/?p=28213 Ezzeldin Hussein, Regional Senior Director, Solution Engineering, META, SentinelOne joined us for a fascinating chat! In this video, we dove deep into how SentinelOne’s Singularity Hyperautomation is revolutionising security operations. Discover what makes SentinelOne’s Purple AI different and a TRUE game-changer, and witness how AI is enabling instant real-time threat detection and action. Learn how AI boosts accuracy and silences the noise. Finally, get Ezzeldin’s predictions for the next 5 years of AI-powered security:

]]>
GISEC Global 2025: A Place Where Innovation, Partnerships, and Leadership Come Together https://securityreviewmag.com/?p=28137 Tue, 29 Apr 2025 16:42:25 +0000 https://securityreviewmag.com/?p=28137 Meriam ElOuazzani, the Senior Regional Director for META at SentinelOne, says, the company will showcase its latest developments in AI-powered security solutions, reinforcing its position as a leader in this area

What key messages or solutions are you highlighting at GISEC this year?
At GISEC 2025, we are focusing on the theme “Autonomous Cybersecurity: AI-Powered Resilience at Machine Speed.” This emphasizes our dedication to providing innovative, automated security solutions that enable organizations to proactively respond to changing cyber threats.

We will highlight our newest advancements in the Singularity Platform, including the introduction of Singularity Hyperautomation, which allows security teams to connect, automate, and streamline workflows without any coding required. Moreover, our AI SIEM for the Autonomous SOC will be showcased, recognized as the industry’s fastest AI-driven open platform capable of processing, detecting, and safeguarding enterprise environments on an exabyte scale. We will also present our Purple AI, the foremost AI security analyst, illustrating how it aids in early threat detection, rapid response, and maintaining a proactive stance against attacks through AI-fueled security intelligence.

How does GISEC help your company engage with the Middle Eastern cybersecurity market?
GISEC is a place where innovation, partnerships, and leadership come together. Our focus is not just on protection but on building resilience, helping businesses get ready for, withstand, and recover from cyberattacks while keeping their operations running smoothly. By being part of GISEC, we showcase our latest developments in AI-powered security solutions, reinforcing our position as a leader in this area.

We also connect with regional enterprises and governments. As the Middle East quickly adopts new technologies like AI and cloud services, cybersecurity has become essential for many organizations. GISEC provides a chance for us to engage with these groups and discuss how they can improve their security measures.

We also focus on educating and inspiring security leaders. Through expert sessions and live demonstrations, SentinelOne helps organizations understand how AI and automation can change the way they approach cybersecurity. This knowledge empowers them to create stronger security operations that can better handle the challenges of the digital world.

How would you describe the current cybersecurity threat landscape in the Middle East?
This year, a major cybersecurity challenge in the Middle East is the merging of AI-driven threats, the rise of ransomware, and vulnerabilities associated with third parties, all taking place within a context of rapid digital transformation. As companies adopt cloud technologies, IoT, and AI to facilitate innovation, their potential exposure to attacks is growing quickly, often outstripping their capacity to protect themselves. The threat actors in the region are evolving, using automation, AI, and weaknesses in supply chains to execute quicker and more complex attacks.

What are the most pressing cyber threats facing businesses in the region today?
In 2025, businesses in the Middle East, particularly in the UAE, are contending with a rapidly evolving cyber threat landscape. Ransomware remains a significant threat, with attackers employing advanced tactics to target critical sectors such as finance, healthcare, and energy. The emergence of Ransomware-as-a-Service (RaaS) platforms has lowered the barrier to entry for cybercriminals, leading to increased attack frequency and sophistication.​

The proliferation of generative AI tools has enabled the creation of convincing phishing campaigns. These attacks often impersonate trusted entities, making it challenging for individuals to discern malicious communications. Organizations are implementing advanced AI-powered detection systems and enhancing employee training to mitigate these risks.​

Additionally, malicious or inadvertent insider threats pose a significant risk to organizations. Attackers can exploit supply chain vulnerabilities to gain unauthorized access to systems. Businesses are adopting zero-trust architectures and conducting thorough assessments of third-party vendors to enhance security.​

How do cultural or regulatory differences impact cybersecurity strategies in the Middle East compared to other regions?
Culturally, there is a strong emphasis on data sovereignty, privacy, and national security. Organizations are highly sensitive to where their data is stored and who has access to it, leading to a preference for localized data centers and on-premises security solutions in sectors like government, finance, and energy. Trust and relationship-building are also critical in business engagements, meaning that cybersecurity partnerships often hinge on technology, credibility, transparency, and long-term commitment.

From a regulatory perspective, countries like the UAE and Saudi Arabia have introduced robust national cybersecurity frameworks and sector-specific regulations, such as the UAE’s Information Assurance Standards and Saudi Arabia’s Essential Cybersecurity Controls (ECC). These mandates often require higher compliance rigor than some international standards, with specific provisions for critical infrastructure protection, cloud usage, and breach reporting timelines.

As a result, cybersecurity strategies in the Middle East must be highly adaptive, balancing global best practices with regional regulations, ensuring data localization, and respecting local cultural nuances in risk management, governance, and incident response planning.

How do your company’s products and services address the specific threats faced by regional businesses?
SentinelOne’s products and services are uniquely designed to address the specific cybersecurity threats regional businesses face in the Middle East, where the stakes are exceptionally high across sectors like finance, energy, healthcare, and government.

Understanding the importance of data sovereignty and compliance with regional regulations, SentinelOne provides flexible deployment options, including on-premises solutions, to meet the specific needs of Middle Eastern enterprises. This adaptability ensures that organizations can have control over their data while benefiting from advanced security measures.

Our Singularity Platform delivers AI-powered, autonomous protection across endpoints, cloud, identity, and data, enabling organizations to detect, respond, and recover from threats at machine speed. With threats such as ransomware, supply chain attacks, and phishing campaigns becoming more sophisticated, our platform ensures real-time defense without operational disruption. We also address the growing shift to the cloud with Singularity Cloud Security, providing real-time protection for VMs, containers, and Kubernetes environments, aligned with the region’s agility, compliance, and data sovereignty needs.

To counter the rise of AI-driven and nation-state attacks, our AI SIEM for the Autonomous SOC delivers exabyte-scale ingestion and lightning-fast detection, providing unmatched visibility and threat intelligence across enterprise environments. Singularity Hyperautomation enables organizations to automate SecOps workflows without coding, drastically improving response times and reducing alert fatigue.

Finally, Purple AI empowers security teams with natural language-driven threat hunting and contextual investigations, dramatically enhancing human capability and operational resilience. Through this unified and autonomous approach, SentinelOne ensures regional businesses can stay protected, compliant, and resilient in today’s AI-powered threat landscape.

What advice would you give to regional businesses looking to strengthen their cybersecurity posture in 2025?
Focus on building resilience, not just defense. The threat landscape in the Middle East is evolving rapidly, driven by AI-powered attacks, ransomware escalation, and supply chain vulnerabilities. It’s no longer enough to rely on traditional perimeter defenses. Businesses must adopt a proactive, intelligence-driven approach that combines prevention, detection, response, and recovery into a unified strategy.

Invest in AI-powered security platforms that provide real-time visibility across endpoints, cloud, identity, and network layers. Automation and hyperautomation will be crucial to manage alert fatigue, speed up response times, and enable the security operations center (SOC) to scale effectively.

Equally important, embed cybersecurity into your business culture, train employees, establish clear incident response plans, and align cybersecurity initiatives with business objectives. Engage with frameworks like NIST or ISO 27001 and stay informed about evolving regional compliance requirements. Lastly, partner with trusted cybersecurity providers who know the region’s unique challenges around data sovereignty, regulatory expectations, and operational resilience. Cybersecurity is no longer just an IT responsibility, it’s a fundamental pillar of sustainable business growth in 2025 and beyond.

]]>
“Be Confident in Your Abilities and What You Bring to the Table” https://securityreviewmag.com/?p=27815 Mon, 24 Feb 2025 07:04:35 +0000 https://securityreviewmag.com/?p=27815 Meriam ElOuazzani, the Senior Regional Director for META at SentinelOne says her leadership style is collaborative and adaptable, with a strong emphasis on open communication, mutual respect, and shared goals

Can you share your journey into the technology world? What inspired you to pursue a career in this field?
My journey into technology began with my father, who recognized my strong mathematical abilities and encouraged me to explore my potential. From an early age, I had a natural talent for problem-solving and working with numbers, which laid the foundation for my career in tech. What drew me to this field was the constant evolution and challenge it presents. Technology is at the heart of innovation, shaping industries and transforming the way we live and work.

The opportunity to solve complex problems, drive progress, and be part of something dynamic and impactful has always been a strong motivator for me. Technology is more than just a career for me, it’s a passion. I’m driven by the pursuit of knowledge, the excitement of innovation, and the ability to make a meaningful impact through cutting-edge solutions. This journey continues to inspire me, and I look forward to contributing to the ever-evolving world of technology.

What were some of the biggest challenges you faced as a woman, and how did you overcome them?
Breaking into the industry was one of my biggest challenges, especially after moving to the Middle East from Morocco, where the culture and business landscape were different. My journey began at HP, where I had the privilege of working with incredible leaders who believed in my potential and opened doors to my first career opportunities. Later, at Cisco, I collaborated with talented professionals who taught me how to navigate competition, handle setbacks, and continuously push forward. I also had the opportunity to learn from exceptional mentors who encouraged me to excel.

Building my career required persistence and adaptability. Without an established professional network, I had to create my own path – seizing every opportunity to develop my expertise, expand my connections, and prove my capabilities. Securing my first senior role in technology was a turning point, marking the beginning of an exciting and fulfilling journey. Throughout my career, challenges such as adapting to rapidly evolving technologies and navigating high-stakes environments have driven my growth. With the support of inspiring leaders and a commitment to continuous learning, I overcame setbacks through mentorship, upskilling, and active engagement in the tech community.

At VMware, I led the NSX channel practice for the Middle East, mastering the art of balancing strategic and operational responsibilities. Later, I joined SentinelOne, where I expanded my expertise in building businesses, structuring teams, and driving go-to-market strategies. Today, I take pride in my journey and the lessons learned along the way. Every challenge has shaped me into the person I am today.

How do you describe your leadership style, and how has it evolved over time?
My leadership style is collaborative and adaptable, with a strong emphasis on open communication, mutual respect, and shared goals. Early in my career, I focused on setting clear objectives and guiding my team, but over time, I’ve realized the value of empowering others to take ownership of their work while offering support when needed. This shift has not only enhanced engagement and creativity but also boosted the team’s confidence and capability.

I believe that fostering an open and supportive environment is essential for success. Encouraging team members to share their ideas and feedback leads to better collaboration and problem-solving. Rather than judging someone’s work, a leader should aim to understand the challenges and opportunities at play, offering support to help the team succeed on the ground. Given the fast-paced nature of the tech industry, I’ve learned the importance of staying flexible and adjusting strategies to remain effective. Leadership is a continuous learning journey, and I strive to grow by seeking insights from others, learning from mentors, and being open to feedback.

Currently, my focus is on supporting my team’s development through training, mentorship, and providing opportunities for growth. I also recognize the importance of recognition – when people feel supported and valued, they do their best work. While I’m always learning and evolving, my core goal remains unchanged: to help my team succeed and create a positive, productive environment where we can all thrive together.

What strategies do you use to motivate and empower your team?
I aim to build strong relationships by taking the time to understand the aspirations and challenges of those I work with, creating a space where they feel supported in sharing their experiences. Together, we set achievable goals for their growth, whether it’s advancing in their roles, developing specific skills, or broadening their network. I try to offer guidance, advice, and constructive feedback to help them overcome obstacles and improve their leadership approach, while also supporting their career growth through encouragement and advocacy.

I also encourage them to recognize their strengths, advocate for their own development, and take initiative in seeking opportunities. I believe in celebrating their successes, however small, as it helps to build confidence and motivation. Through these efforts, I hope to contribute, in whatever way I can, to a more diverse, inclusive, and equitable workplace where everyone feels supported in their growth.

Have you had any mentors or role models who have significantly influenced your career? How did they impact your journey?
My role model in life over the past few years has been my daughter, Yasmina. She is an international gymnast who began her journey in rhythmic gymnastics at the age of three. Watching her train for four hours every day, six days a week, has been nothing short of inspiring. The sport demands not only physical stamina but also incredible consistency and grit, and Yasmina embodies all of this.

I watch her fight for excellence in every competition, always pushing herself to do better, no matter the challenge. Today, at 11 years old, she continues to tackle each new opportunity with unwavering determination, never backing down from any challenge, no matter where it takes her. Her journey has taught me so much about resilience, perseverance, and the power of never giving up, and I carry these lessons with me every day.

What advice would you give to young women aspiring to enter the technology world?
Get to work – take action and pursue your passion for technology. Dive into learning opportunities, seek out internships, and apply for entry-level positions to gain hands-on experience. Invest in yourself, and your knowledge. Continuously strive to expand your skills and expertise. Stay curious, take courses, pursue certifications, and stay updated with the latest trends and advancements in technology.

Be confident in your abilities and what you bring to the table. You are capable of achieving great things in the field of technology, so trust in your potential and never doubt your worth. Never let anyone tell you that you cannot do it; you have the power to defy expectations and overcome obstacles. Stay focused on your goals, persevere through challenges, and prove to yourself and others that you are capable of wonders.

Surround yourself with mentors and sponsors who can provide guidance, support, and opportunities for advancement. Seek out both male and female mentors who can offer diverse perspectives and insights. Remember, the journey into technology may have its challenges, but with determination, resilience, and belief in yourself, you can carve out a successful and fulfilling career in this dynamic field.

Can you highlight some of your proudest achievements in your career so far?
One of my proudest achievements in my career is having started my journey in tech. It’s a field that constantly challenges and inspires me, and I’m grateful for the opportunities that have allowed me to grow. I’m particularly proud of the mentorship I’ve received along the way, learning from incredible leaders who have shared their insights, guided my development, and helped me navigate the challenges of the tech industry.

But what truly fills me with pride is that I’m still dreaming in tech. I continue to be passionate about the impact technology can have on the world, and I’m excited to keep pushing the boundaries of what’s possible. The journey has been fulfilling, and every milestone is a reminder of how far I’ve come and how much more I’m determined to achieve.

How do you manage work-life balance, and what tips do you have for other women striving to achieve this balance?
Managing work-life balance can indeed be a challenge, especially when you’re passionate about your work, but I’ve learned that spending time with my family is absolutely essential for recharging. It gives me the chance to step away from the demands of work and reconnect with what truly matters. Traveling to new places and experiencing different cultures has become a key way for my family and me to unwind together. It’s a time to reset, gain fresh perspectives, and experience life beyond the professional world, which ultimately helps me stay focused, refreshed, and energized when I return to work.

My advice to others facing similar challenges is to actively carve out time for the things that allow you to disconnect, even if it feels hard at first. It’s easy to get lost in work, but making time for family, travel, or personal interests – even if it’s just small moments – can significantly improve your balance. Taking those breaks isn’t just for your well-being; it actually enhances your productivity and effectiveness in the long run. It’s about creating a sustainable rhythm that allows you to thrive in both your personal and professional life.

]]>
Cloud and IoT Vulnerabilities Expose Smart Cities and Industrial Systems to Cyber Risks https://securityreviewmag.com/?p=27764 Sat, 08 Feb 2025 08:43:58 +0000 https://securityreviewmag.com/?p=27764 Ezzeldin Husein, the Regional Senior Director for Solution Engineering – META at SentinelOne says cyberattacks on MEA’s critical infrastructure are becoming more sophisticated, with nation-state actors, ransomware gangs, and hacktivists targeting energy, finance, and transportation sectors

Can you provide an overview of the current cybersecurity landscape for critical infrastructure in the MEA region?
The cybersecurity landscape for critical infrastructure in the MEA region is evolving rapidly, driven by digital transformation, AI adoption, and geopolitical shifts. Governments and enterprises are investing in robust cybersecurity frameworks to protect energy, finance, and transportation sectors from escalating threats. Nation-state attacks, ransomware, and supply chain vulnerabilities remain key risks.

The UAE and Saudi Arabia lead regional efforts with AI-driven security, zero-trust models, and national cybersecurity strategies. However, challenges persist, including skills gaps, regulatory fragmentation, and balancing innovation with security. Strengthening cyber resilience through public-private collaboration and advanced threat intelligence is crucial to safeguarding MEA’s critical infrastructure.

What are the most notable trends in cyber attacks targeting these systems?
Cyberattacks on MEA’s critical infrastructure are becoming more sophisticated, with nation-state actors, ransomware gangs, and hacktivists targeting the energy, finance, and transportation sectors. Key trends include AI-powered attacks, deepfake-based social engineering, and supply chain compromises. Ransomware-as-a-Service (RaaS) is surging, often disrupting essential services.

Cloud and IoT vulnerabilities expose smart cities and industrial systems to cyber risks. Additionally, geopolitical tensions drive espionage and sabotage attempts on nuclear and AI projects. As MEA nations accelerate digital transformation, adversaries exploit gaps in cybersecurity maturity, making proactive threat intelligence, zero-trust architecture, and AI-driven defences essential for safeguarding critical infrastructure.

Which sectors in the MEA region are most vulnerable to cyber attacks, and why?
The MEA region’s energy, water, transportation, and healthcare sectors are highly vulnerable to cyberattacks due to their critical role in national security and economic stability. Energy infrastructure, including oil, gas, and power grids, is a prime target for nation-state attacks and ransomware, especially as nuclear initiatives expand. Water systems, reliant on IoT and SCADA, face risks of disruption.

Transportation networks, including ports and aviation, are exposed to ransomware and supply chain threats. Healthcare is increasingly targeted for patient data and system access. Legacy systems, cybersecurity gaps, and geopolitical tensions make these sectors attractive targets, necessitating robust cyber resilience strategies.

What are the primary motivations behind cyber attacks on critical infrastructure in the MEA region?
Cyberattacks on critical infrastructure in the MEA region are primarily driven by geopolitical, financial, and sabotage motivations. Geopolitical tensions lead to state-sponsored attacks, particularly on energy and nuclear assets, aimed at gaining strategic advantages or disrupting adversaries. Financial motives drive ransomware attacks, seeking monetary gain by targeting high-value sectors like energy and healthcare.

Sabotage is another key motivation, especially in critical sectors like water and transportation, where attackers aim to disrupt operations and create instability. These attacks are often compounded by regional political conflicts, technological dependencies, and the ongoing race for dominance in emerging industries like AI and nuclear power.

How important is employee training and awareness in preventing cyber attacks on critical infrastructure?
Employee training and awareness are crucial in preventing cyberattacks on critical infrastructure in the MEA region. Human error remains one of the leading causes of security breaches, with phishing and social engineering tactics often targeting employees. Regular training on recognising threats, following cybersecurity best practices, and understanding the importance of data protection can significantly reduce the risk of successful attacks.

Educating staff about emerging threats, secure use of digital tools, and incident response protocols strengthens the overall cybersecurity posture. By fostering a security-conscious culture, organisations can minimise vulnerabilities, ensuring robust defences against cyber threats targeting critical infrastructure.

What role does proactive threat intelligence play in securing critical infrastructure systems?
Proactive threat intelligence is essential for securing critical infrastructure systems in the MEA region. By continuously monitoring emerging threats, vulnerabilities, and attack techniques, organisations can identify and mitigate potential risks before they escalate. Threat intelligence enables early detection of cyberattacks, allowing for faster response times and minimising the impact on operations.

It also helps in forecasting future attack patterns, enabling better preparation and adaptive security strategies. Integrating threat intelligence into risk management processes improves decision-making, enhances situational awareness, and strengthens defences against advanced persistent threats (APTs), ransomware, and other targeted attacks, ensuring the resilience of critical infrastructure systems.

Are there any technologies being deployed to safeguard critical infrastructure in the region?
Yes, several advanced technologies are being deployed to safeguard critical infrastructure in the MEA region. AI and machine learning are increasingly used for threat detection, anomaly detection, and automated response, enhancing the ability to identify and mitigate emerging threats in real time. Zero-trust architecture is gaining traction, ensuring that no entity, whether internal or external, is trusted by default, reducing the risk of insider threats and lateral movement in case of breaches. Additionally, security automation tools and advanced encryption techniques are being utilised to strengthen data protection and network resilience, providing a multi-layered defence strategy for critical infrastructure.

What are the biggest challenges companies face in securing critical infrastructure in the MEA region?
Companies in the MEA region face significant challenges in securing critical infrastructure, including a lack of resources, outdated systems, and skilled workforce shortages. Many organisations still rely on legacy systems, which are vulnerable to modern cyber threats and are costly to update. The region also struggles with a shortage of cybersecurity talent, making it difficult to build and maintain robust defence systems.

Additionally, budget constraints and competing priorities often hinder investment in necessary security tools and technologies. Geopolitical tensions and regulatory complexities further complicate efforts, making it essential for companies to adopt comprehensive and agile cybersecurity strategies.

What role do MEA governments play in regulating and enforcing cybersecurity standards for critical infrastructure?
MEA governments play a crucial role in regulating and enforcing cybersecurity standards for critical infrastructure by establishing national cybersecurity frameworks and compliance mandates. Many countries have introduced sector-specific regulations, such as in energy, finance, and healthcare, to ensure the protection of critical assets.

Governments often collaborate with private sector stakeholders to create cybersecurity policies and best practices, while also imposing penalties for non-compliance. They support cybersecurity awareness and training initiatives to build a skilled workforce. Additionally, governments invest in cyber defence capabilities, and some form international alliances to tackle cross-border cyber threats and improve regional resilience.

How can companies ensure business continuity while recovering from a cyber attack on their critical systems?
Companies can ensure business continuity during recovery from a cyber attack by implementing a comprehensive incident response plan that includes backup systems and disaster recovery protocols. This plan should be regularly tested to ensure its effectiveness. Organisations should maintain offline backups of critical data and leverage cloud-based recovery solutions for quick restoration.

Employing a business continuity management system helps prioritise essential services and minimise downtime. In parallel, real-time monitoring and network segmentation can isolate affected systems, preventing further damage. Effective communication with stakeholders, along with robust cyber insurance coverage, ensures resilience and minimises the long-term impact of the attack.

]]>
SentinelOne to Spotlight AI-Driven Cybersecurity at LEAP 2025 https://securityreviewmag.com/?p=27742 Tue, 04 Feb 2025 15:43:32 +0000 https://securityreviewmag.com/?p=27742 SentinelOne has announced its participation at LEAP 2025, alongside its distributor, AlJammaz Technologies. The company will showcase its AI-powered cybersecurity solutions including advanced EDR, XDR, and ITDR solutions designed to deliver autonomous protection against evolving cyber threats.

SentinelOne’s solutions align with the Kingdom’s strategic priorities by offering proactive AI-driven protection for critical infrastructure, enterprises, and government entities. The company’s Singularity platform, known for its real-time, AI-driven threat detection, response, and prevention, will be at the centre of its presence at the exhibition. The platform enables enterprises to protect their endpoints, cloud environments, and identity layers, allowing them to innovate confidently amidst evolving cyber threats.

Speaking on their participation, Meriam ElOuazzani, Senior Regional Director, META at SentinelOne, said, “Cybersecurity remains central to progress with Saudi Vision 2030’s digital leadership and economic goals, and our solutions empower businesses to outpace evolving threats and fuel growth. By participating at LEAP, we aim to engage with key stakeholders in the tech ecosystem, explore new partnerships, and demonstrate how our solutions are reshaping workforce capabilities and the future of digital resilience.”

SentinelOne’s AI strategy focuses on delivering autonomous, real-time protection by leveraging machine learning and behavioural AI. This ensures businesses can detect, mitigate, and remediate cyberattacks faster and more effectively than traditional solutions. Senior executives from SentinelOne will be onsite at the AlJammaz Executive Lounge in Hall 1 to share insights on AI-driven security strategies and the future of autonomous cybersecurity. Visitors can also experience live demonstrations of the Singularity platform.

]]>
SentinelOne to Present its Latest Advancements in Autonomous SOC Technology at Black Hat 2024 https://securityreviewmag.com/?p=27450 Mon, 25 Nov 2024 07:45:05 +0000 https://securityreviewmag.com/?p=27450 Ezzeldin Hussein, the Regional Senior Director for Solution Engineering at SentinelOne, says organisations in the region face the dual challenge of securing legacy systems and adapting to stricter data privacy regulations

How has the regional threat landscape evolved over the past few months?
The threat landscape in the Middle East and Africa has seen a significant rise in both sophistication and volume of cyberattacks, reflecting global trends while highlighting regional nuances. Threat actors increasingly target critical sectors such as government, finance, energy, and healthcare, exploiting the region’s rapid digital transformation and heightened reliance on cloud and IoT technologies.

Ransomware attacks remain prevalent, with double-extortion tactics and new variants posing significant risks. Additionally, the surge in AI-driven attacks has enabled adversaries to conduct highly targeted phishing campaigns and bypass traditional defences. State-sponsored cyber activities and Advanced Persistent Threats (APTs) are also rising, focusing on geopolitical motives.

Organizations in the region face the dual challenge of securing legacy systems and adapting to stricter data privacy regulations.

What are the five major cybersecurity predictions for the upcoming months?
As generative AI becomes more accessible, cybercriminals will weaponize AI to craft more convincing phishing emails, evade detection mechanisms, and automate attacks. Organizations will need AI-driven defences to counter these. Critical sectors including energy, healthcare, and transportation will also face heightened attacks, especially ransomware and state-sponsored campaigns that disrupt services or gather intelligence. Strengthening OT/IT security will become a priority.

Additionally, ransomware tactics will evolve with triple-extortion methods, where attackers encrypt data, steal sensitive information, and threaten reputational damage through leaks or DDoS attacks due to unmet demands. Organizations will prioritize resilience over mere defence, investing in automated threat detection, response, and recovery solutions to ensure business continuity amidst complex attacks.

Lastly, new and evolving data privacy laws in the GCC and globally will push organizations to align their security strategies with compliance frameworks, leading to a surge in demand for solutions that address security and regulatory requirements.

What are your plans for Black Hat MEA?
At Black Hat MEA 2024, SentinelOne will present its latest advancements in autonomous SOC technology, designed to streamline and enhance security operations. Key innovations include Singularity Hyperautomation, a no-code solution enabling automation of security workflows with over 100 integrations and pre-built workflows. Singularity AI SIEM will be on display too, an AI-driven SIEM solution, that provides real-time detection across diverse data sources to improve visibility and response across the enterprise.

SentinelOne will also spotlight new capabilities in Purple AI, its generative AI-powered security analyst for triaging alerts and conducting autonomous investigations, effectively reducing alert fatigue, as well as Ultraviolet, SentinelOne’s family of specialized multimodal models and large language models (LLMs) built for cybersecurity, that offer precise detections and address complex security challenges.

Will you be running any offline or online events alongside Black Hat MEA?
We invite visitors to our booth to experience the thrilling ‘Mortal vs. Machine’ challenge, where they can compete against a SentinelOne cybersecurity expert and leverage Purple AI to see who can identify, remediate, and report a threat the fastest. Alongside this, we will host live demonstrations of our cybersecurity solutions, engaging discussions with industry leaders, and thought leadership meetings to share insights and strategies for building resilient, future-proof security frameworks.

Tell us about your regional commitment in terms of expanding reach through partnerships.
At SentinelOne, we are deeply committed to supporting the Middle East’s growing demand for advanced cybersecurity solutions. Our local team and partnerships with leading system integrators, managed security providers, and technology partners allow us to deliver scalable, innovative, and autonomous cybersecurity solutions that meet the region’s unique challenges.

]]>
Video: Interview with Meriam ElOuazzani of SentinelOne https://securityreviewmag.com/?p=27390 Fri, 15 Nov 2024 11:22:04 +0000 https://securityreviewmag.com/?p=27390 We spoke to Meriam ElOuazzani of SentinelOne, about OneConnect Dubai 2024, the role of generative AI and autonomous technologies in cybersecurity, Singularity Hyperautomation, and SentinelOne’s focus at Black Hat MEA 2024. Check out the video interview below:

]]>
Lenovo PCs Get AI Security Boost from SentinelOne https://securityreviewmag.com/?p=27171 Sat, 21 Sep 2024 14:46:41 +0000 https://securityreviewmag.com/?p=27171 SentinelOne and Lenovo have announced a multi-year collaboration to bring AI-powered endpoint security to millions of Lenovo devices across the globe. Lenovo will include SentinelOne’s industry-leading Singularity Platform and generative AI capabilities (Purple AI) in new PC shipments, as well as offer upgrades to existing customers to expand its ThinkShield security portfolio and autonomously protect devices from modern attacks.

“The complexity and speed of today’s cyber threats demand an intelligent, adaptable defence,” said Nima Baiati, Executive Director and General Manager, Cybersecurity Solutions, Intelligent Devices Group, Lenovo. “SentinelOne’s Singularity Platform and Purple AI are at the forefront of this evolution, offering unparalleled, AI-powered protection. As Lenovo introduces groundbreaking new AI PCs to the market, we are integrating these cutting-edge AI-powered endpoint security capabilities into Lenovo’s ThinkShield security platform. This will enhance endpoint protection and fortify enterprise resilience against the ever-evolving threat landscape.”

Lenovo is a leading enterprise PC vendor that sells tens of millions of devices annually. The new agreement between the long-time strategic partners is designed to significantly increase the number of Lenovo devices that ship with SentinelOne’s AI-powered security and will benefit from Lenovo’s broad global sales and partner network. As a result, Lenovo’s direct sales team and channel partners can provide cutting-edge, built-in security to businesses of all sizes.

“Cyber resilience is incredibly important for business continuity as organizations increasingly face the unpredictable. Our security services collaboration with SentinelOne is another key aspect of Lenovo’s cybersecurity and cyber resilience services intended to help protect customers from anomalous threats,” said Patricia Wilkey, SVP and GM of Lenovo Solutions and Services Group International Sales. As part of the expanded collaboration, Lenovo will also build a new Managed Detection and Response (MDR) service using AI and EDR capabilities from SentinelOne’s Singularity Platform as its foundation.

“The endpoint remains a primary vector of cyberattacks and the most critical part of a business’ ongoing operations. By working with market leaders like Lenovo, we can rapidly scale AI-powered security to millions of PCs and servers across the globe,” said Akhil Kapoor, Vice President Embedded Business, SentinelOne. “It’s an opportunity for Lenovo and SentinelOne to give Lenovo customers a clear security and resiliency advantage by delivering intelligent devices that defend themselves in real time.”

]]>
SentinelOne and Google Cloud Join Forces for AI Cyber Defense https://securityreviewmag.com/?p=27088 Mon, 26 Aug 2024 07:44:55 +0000 https://securityreviewmag.com/?p=27088 SentinelOne has said that it is proud to be a strategic endpoint vendor for Mandiant Consulting. Building on this strong partnership, SentinelOne and Google Cloud are now enhancing their collaboration to enable stronger enterprise cyber defence. By integrating SentinelOne’s advanced AI-driven autonomous endpoint protection with Google Cloud’s extensive threat intelligence, the strategic partnership enables customers to strengthen their security posture.

“To help our customers reduce the business impact of cyber threats and keep today’s modern IT environments safe, Google Cloud partners with fellow market leaders to deliver highly adaptable and intelligence-led solutions,” said Sandra Joyce, Vice President, Google Threat Intelligence. “SentinelOne brings an advanced cybersecurity platform for continued delivery and integrations into Google threat intelligence and related services. By expanding our strategic alliance, we can deliver dynamic telemetry and generative AI capabilities that drive stronger security outcomes.”

This announcement marks a new phase of the strategic partnership between SentinelOne and Google Cloud. Building on the success of this initial integration, the companies will jointly share telemetry data to provide the most comprehensive security insights, empowering organizations to harden their posture and protect against the latest threats. SentinelOne will also use this data with Google Gemini 1.5 Pro and Flash models to further enhance the autonomous capabilities of its Purple AI and Singularity Platform.

“Google Cloud is a leader in online security, setting the benchmark for delivering highly secure online services at an unprecedented scale,” said Ric Smith, Chief Technology and Product Officer of SentinelOne. “Google Cloud and SentinelOne share a security-first mindset, and in deepening our collaboration, we’re fusing the best security and threat intelligence services with the most advanced AI-based protection platform to deliver infinite-scale cybersecurity at machine speed. This brings Google Cloud’s intelligence to SentinelOne customers and SentinelOne’s best-of-breed endpoint protection to Mandiant’s managed security services.”

]]>
SentinelOne and Intezer Join Forces to Combat Rust Malware https://securityreviewmag.com/?p=27076 Thu, 22 Aug 2024 07:19:45 +0000 https://securityreviewmag.com/?p=27076 SentinelOne and Intezer have launched a project to illuminate the blind spot surrounding Rust malware so that threat researchers can better understand and accurately characterize the complex malware ecosystem before it reaches critical mass and blindsides the industry. As part of the initiative, researchers from SentinelLabs and Intezer have teamed to develop a methodology to make reverse engineering Rust malware more approachable and engage the security community to create and release tools to tackle the problem head-on. The project is known as 0xA11C.

“In malware analysis, the arrival of a new programming language introduces an entirely new set of challenges that obstruct our ability to grasp the malicious intent of a threat actor quickly,” said Juan Andrés Guerrero-Saade, AVP of Research, SentinelLabs. “With the current state of our tooling, Rust is practically impossible to reverse engineer, and as a result, many analysts are shying away from researching the Rust malware ecosystem. Together with Intezer, we aim to change this.”

In 2021, SentinelLabs researchers took a similar approach to address the rise of Go malware, developing a Go malware analysis methodology dubbed ‘AlphaGolang.’ Their efforts revealed that once underlying data is returned to its rightful context, reversing engineering Golang malware can often be easier than malware written with traditional programming languages.

“We’ve observed a similar trend with Rust malware,” said Nicole Fishbein, Security Researcher, Intezer. “The same features of Rust that engineers love, such as memory safety, aggressive compiler optimizations, borrowing, intricate types and traits, translate into a perplexing tangle of code that surpasses even C++ in the complexity of its abstractions. Drawing on insights derived from the development of AlphaGolang, we can gain additional clarity, into the true size of the Rust malware ecosystem and arm reverse engineers with tools to take it head on.”

]]>