Interviews – Security Review Magazine https://securityreviewmag.com We bring you the latest from the IT and physical security industry in the Middle East and Africa region. Mon, 12 May 2025 12:12:45 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://securityreviewmag.com/wp-content/uploads/2024/08/cropped-SRico-32x32.png Interviews – Security Review Magazine https://securityreviewmag.com 32 32 ManageEngine @ GISEC Global 2025: AI, Quantum Computing, and Ransomware Form Part of Cybersecurity Outlook for 2025 https://securityreviewmag.com/?p=28236 Mon, 12 May 2025 12:08:28 +0000 https://securityreviewmag.com/?p=28236 As AI-powered attacks and quantum computing reshape the cyber threat landscape, organizations must rethink traditional defense strategies. In an exclusive interview, Sujoy Banerjee, Associate Director at ManageEngine, reveals how businesses can prepare for 2025’s most critical threats—from AI-generated phishing scams to quantum-decrypted ransomware

What do you see as the most critical emerging cybersecurity threats in 2025, and how should organizations prepare for them?
Emerging technologies like AI and ML are disruptors leading to the rise of cyberattacks. AI-powered attacks are increasingly affecting businesses via phishing scams, ransomware attacks, malware attacks, and endpoint vulnerability exploitation. Organisations need to move beyond traditional defences to mitigate this risk. By investing in proactive measures, like penetration testing to uncover vulnerabilities, and using purple team exercises to simulate real-world attacks, organisations can improve their threat detection and response.

With threats targeting both on-premises systems and cloud environments, it’s crucial to secure all digital fronts. Companies must also run tailored incident response drills to stay ready for fast-moving threats. Ultimately, building a strong, adaptive cybersecurity strategy that accounts for AI-driven attacks is essential to protect digital assets and stay resilient in the face of evolving cyber risks.

How is the rise of AI and quantum computing reshaping the cybersecurity landscape, and what risks do they introduce?
As much as it is being hailed for making our lives easy, AI has also become a powerful ally for digital miscreants. In particular, threat actors are using generative AI (GenAI) to create highly convincing phishing emails, fake websites, and deepfakes for deceiving users and stealing their information. Threat actors are also using GenAI to develop sophisticated malware that bypasses traditional security defences.

Similarly, quantum computing is a double-edged sword. These powerful machines are capable of rendering traditional encryption methods obsolete, especially public key cryptography, as what once took a traditional computer years to decode RSA-2048 (a widely used encryption algorithm) takes a quantum computer a matter of seconds or minutes to decode.

How do you predict ransomware tactics will evolve in the near future, and what proactive measures should businesses take?
Threat actors are using AI to develop sophisticated, highly accurate ransomware that not only widens the reach of the attack but increases the impact on its victims. And this issue will only get worse as threat actors evolve their use of AI to carry out these attacks, drastically altering the threat landscape.

Businesses can adopt several key strategies to defend against ransomware attacks effectively. These include improving employee awareness and periodic training, restricting user access by implementing a Zero Trust approach and multi-factor authentication, taking regular data backups, keeping systems updated, and configuring the firewall to filter out suspicious activities and network segmentation to limit the spread of malware.

How does regulatory compliance (like UAE’s Data Protection Law or Saudi’s NCA requirements) impact cybersecurity strategies for regional businesses?
Governments across the region, led by the UAE and Saudi Arabia, have taken it upon themselves to enforce a safe and resilient cyberspace. This is in line with the region’s ongoing efforts to promote digital innovation, thereby delivering better services for people and driving faster economic growth. Compliance mandates, like Saudi Arabia’s and the UAE’s PDPL, play a major role in setting various polices, standards, and guidelines to safeguard the IT infrastructure in the respective countries. By incorporating these controls in their cybersecurity strategies, regional businesses can improve their security posture and protect their sensitive data. Failure to do so not only makes them vulnerable to cyberattacks, but invites substantial fines, legal action, and loss of operating license.

Can you explain ManageEngine’s “unified security” approach and how it simplifies cybersecurity for enterprises?
With over 20 years of experience in observing the changing IT landscape and building highly scalable and integrable solutions, ManageEngine recognises there is no single path to cyber resilience for enterprises. To stay ahead of both established and emerging threats, there is a need to take a holistic approach wherein identities, endpoints, and network infrastructure are all properly secured and governed. ManageEngine’s AI-powered cybersecurity solutions, all of which have been built from ground-up, effectively ensure this. They also help enterprises comply with the most important cybersecurity frameworks and data privacy regulations like the GDPR and the PDPL.

How does ManageEngine leverage AI to enhance phishing simulations and employee training?
For over a decade, we have been researching emerging technologies, resulting in the development of our own in-house AI based on contextual intelligence. We understand AI’s importance in detecting and mitigating cyberattacks. Our AI capabilities can be leveraged for a variety of security use cases, such as ransomware protection, anomaly detection, data exfiltration, and preventing insider access abuse.

Most phishing attacks are carried out via email, which lures an individual to download malware that enables the attacker to breach the user’s system and network. By relying on AI, our solutions can flag potential phishing attempts by continuously analysing emails and websites. This will enable security administrators to prioritise such threats and mitigate their impact.

]]>
Positive Technologies @ GISEC Global 2025: Demonstrating Cutting-Edge Cyber Threats and AI Defense Strategies https://securityreviewmag.com/?p=28233 Mon, 12 May 2025 11:51:35 +0000 https://securityreviewmag.com/?p=28233 At GISEC Global 2025, Positive Technologies showcased live demonstrations of sophisticated hacking techniques while emphasising the growing role of AI in both cyber attacks and defense. In an exclusive interview with Security Review, Ilya Leonov, the Regional Director at Positive Technologies revealed insights about the Middle East’s evolving threat landscape, their work with regional governments, and why investing in human expertise remains critical despite advancing technologies

Could you tell us about Positive Technologies’ presence at this year’s GISEC event and the solutions you’re showcasing?
This year at GISEC, we’re presenting our latest cybersecurity solutions with a strong focus on hands-on, practical expertise. At our stand, we’re demonstrating sophisticated attack techniques like direct memory access attacks and full injection attacks – these show just how easily devices like laptops can be compromised. We’ve also significantly expanded our Hackosphere area compared to last year, featuring interactive engagements including soldering, device hacking, fixed attacks, and stenography challenges. We’ve doubled the size of this interactive space and hope to see twice the engagement as well.

How does participating in this event help you engage with regional companies?
We’re seeing tremendous participation from across industries – government representatives, oil and gas companies, financial institutions, and many partners. GISEC has established itself as one of the most efficient and prominent cybersecurity events not just in the UAE, but across the entire Middle East region.

Could you share your observations about the current threat landscape in the region and how you’re helping companies address these challenges?
Through our Threat Research Center – the largest in Eastern Europe – we continuously monitor critical infrastructure and analyse activity across the deep and dark web globally. In the Middle East specifically, we’re observing significant activity from APT groups, including state-sponsored hackers and hacktivists targeting critical national infrastructure. Their methods typically involve compromising internal organisational systems or creating backdoors, which they often then sell access to on dark web markets.

What challenges are companies facing regarding AI-powered attacks?
AI is undoubtedly the hot topic in cybersecurity right now. While AI capabilities are becoming increasingly sophisticated and powerful, I firmly believe human expertise remains irreplaceable. That said, we’re seeing substantial AI integration from both sides – threat actors are leveraging it for attacks while cybersecurity professionals are using it for defense. This dual adoption is creating significant impacts, and we anticipate this trend will continue growing over the next 5-10 years.

Are you collaborating with any local entities or governments to address these AI-related security challenges?
Absolutely. We’re actively working with local partners, government agencies, and regional companies to help them understand the AI threat landscape and demonstrate how AI and machine learning can be effectively used to protect their infrastructure.

What key advice would you give regional organisations looking to improve their security posture?
My fundamental recommendation is to invest in human capital. Knowledge and expertise are assets you can’t simply purchase – they need to be developed. An organisation might have the best security tools and infrastructure, but without capable personnel, these resources become ineffective. This is why we emphasise sharing our expertise – not just in defense strategies, but in incident response, investigations, and most importantly, in building local capabilities to elevate overall cybersecurity maturity levels.

]]>
Video: Wallarm Unveils the Key to Cloud-Native API Security at GISEC Global 2025 https://securityreviewmag.com/?p=28223 Sun, 11 May 2025 14:37:47 +0000 https://securityreviewmag.com/?p=28223 In this insightful interview, Ammar Affani, Regional Sales Director, META at Wallarm, unveils his company’s core value proposition: providing cutting-edge protection for modern cloud-native applications with a strong focus on API security, discovery, visibility, and control. Learn how Wallarm empowers organizations to identify API leaks, unused or shadow APIs, and gain comprehensive security insights. With the rise of open banking and interconnected services, Ammar highlights the increasing threat landscape targeting APIs. He further explains how Wallarm offers real-time detection and blocking to safeguard sensitive user credentials and ensure robust API protection:

]]>
Video: CyberKnight on Zero Trust, AI, and Saudi Arabia’s Digital Transformation at GISEC Global 2025 https://securityreviewmag.com/?p=28220 Sun, 11 May 2025 14:27:09 +0000 https://securityreviewmag.com/?p=28220 In this interview, Samir Omar, General Manager – Sales-KSA at CyberKnight reveals CyberKnight’s key focus at GISEC 2025: navigating the new era of cybersecurity with Zero Trust strategies and the integration of AI and AIOps. He explains how CyberKnight is helping customers implement true Zero Trust frameworks in this rapidly evolving landscape. Discover how CyberKnight is actively contributing to Saudi Arabia’s digital transformation, as Samir explains their role as a trusted advisor and enabler, working closely with customers to understand their mission, goals, and vision to help them achieve success:

]]>
Video: SANS Institute Weighs in on Deepfakes, Model Poisoning and Risk Frameworks at GISEC Global 2025 https://securityreviewmag.com/?p=28217 Sat, 10 May 2025 14:57:15 +0000 https://securityreviewmag.com/?p=28217 In this video, Rob T. Lee, Chief of Research at the SANS Institute discuses the biggest AI-related cybersecurity threats that organizations will face in 2025. He dissects adversarial AI attacks, such as model poisoning and deepfake phishing, and clearly explaining how these sophisticated threats differ significantly from traditional cyber attacks.

Deploying AI without a security-first mindset can be perilous and Rob outlines the significant risks enterprises face if they implement AI without proper security safeguards in place. Navigating this new terrain requires a strategic approach, as Rob touches upon what a “risk-based” AI security framework looks like and provides actionable steps on how organizations should begin building one to protect their AI deployments:

]]>
Video: SentinelOne Speaks Hyperautomation, Purple AI, and the Future of Threat Detection at GISEC Global 2025 https://securityreviewmag.com/?p=28213 Sat, 10 May 2025 14:40:54 +0000 https://securityreviewmag.com/?p=28213 Ezzeldin Hussein, Regional Senior Director, Solution Engineering, META, SentinelOne joined us for a fascinating chat! In this video, we dove deep into how SentinelOne’s Singularity Hyperautomation is revolutionising security operations. Discover what makes SentinelOne’s Purple AI different and a TRUE game-changer, and witness how AI is enabling instant real-time threat detection and action. Learn how AI boosts accuracy and silences the noise. Finally, get Ezzeldin’s predictions for the next 5 years of AI-powered security:

]]>
Video: Tenable Discusses Strategies for Smarter Security and OT Protection at GISEC Global 2025 https://securityreviewmag.com/?p=28210 Sat, 10 May 2025 14:14:13 +0000 https://securityreviewmag.com/?p=28210 Bernard Montel, EMEA Technical Director and Security Strategist at Tenable, spoke to us at GISEC Global 2025! He highlighted Tenable’s latest cybersecurity solutions and vulnerability intelligence, showing how they improve risk prioritisation. We discussed the rising importance of OT security in the Middle East, AI’s impact on ransomware defense, challenges in securing legacy OT, and Tenable’s exploration of generative AI for threat detection and more:

]]>
Video: Check Point Unlocks the Middle East’s Cyber Defense Strategies https://securityreviewmag.com/?p=28202 Fri, 09 May 2025 11:31:15 +0000 https://securityreviewmag.com/?p=28202 Uncover the Middle East’s cybersecurity secrets with Ram Narayanan, Country Manager at Check Point, at GISEC Global 2025! We dive into their highlighted solutions tackling regional threats, the power of their Hybrid Mesh Architecture, and why Check Point is doubling down on the Middle East with big investment and expansion plans. Plus, learn how they’re securing critical UAE infrastructure and boosting engagement with partners and customers. Don’t miss these key insights:

]]>
Video: Toshiba Presents Latest Hard Drives and QNAP NAS System Live Demo at INTERSEC 2025 https://securityreviewmag.com/?p=27770 Mon, 10 Feb 2025 16:43:54 +0000 https://securityreviewmag.com/?p=27770 QNAP and Toshiba teamed up at INTERSEC 2025 to showcase the powerful TS-464 4-bay NAS for SMBs. Reza Jahanbin (QNAP) introduces the system, while Rainer Werner Kaese (Toshiba) demonstrates its capabilities with a live demo using Toshiba N300 hard drives and a 10 Gigabit Ethernet connection. Witness the blazing-fast read and write speeds:

]]>
Enhancing Global Security: How Motorola Solutions is Meeting Modern Safety Challenges https://securityreviewmag.com/?p=27685 Tue, 21 Jan 2025 12:04:50 +0000 https://securityreviewmag.com/?p=27685 In an era where security challenges are rapidly evolving, companies worldwide are seeking advanced solutions to stay ahead. Kamal Labban, the Regional Sales Manager for VSS and ACS at Motorola Solutions, discusses how they are tackling these issues with tailored solutions, innovative camera systems like Silent Sentinel and Halo, and cutting-edge AI technologies driving compliance and efficiency across various industries

What safety challenges are companies facing, and how are you addressing them?
Security challenges are on the rise worldwide, and solutions play a crucial role in addressing them. At Motorola Solutions, we’re focused on tailoring the right solutions for specific verticals, from communication systems to video security and physical security measures.

Can you tell us about your various cameras, like Silent Sentinel and Halo, and smart sensors? How are these helping with security?
Silent Sentinel, recently acquired by Motorola Solutions, is a highly specialized camera system designed for applications like oil and gas and maritime monitoring. It can cover up to 30 kilometres and integrates with third-party systems, making it highly competitive.

Our Halo sensors are a recent addition to our video security lineup. We refer to them as “cameras without an eye” because they capture emergency cases in areas where cameras can’t be installed. These sensors detect smoke, the presence of people, and other critical events, seamlessly integrating with Avigilon Unity platforms.

How are these streamlining compliance issues?
Motorola Solutions adheres to international standards to protect data and identities. Our applications related to security involve case-sensitive data and high compliance standards. The entire process, from installation to implementation, is protected and falls under these compliances.

You have various applications impacting different industries, such as healthcare, utilities, and hospitality. How do you tailor your solutions for these sectors?
Motorola Solutions tailors its offerings to meet the specific needs of various verticals. Video security is implemented across all sectors, while access control may be more suitable for certain industries. Our end-to-end solutions from Avigilon enhance security standards, operations, and responses across different verticals.

How do you address rising security challenges in regions like the Middle East?
The Middle East experiences a high demand for security investments due to rising challenges. Motorola Solutions works closely with governments and complies with local standards to tailor our solutions. By constantly monitoring and receiving feedback from end users, we can effectively address challenges and introduce the right solutions in the market.

AI is a buzzword in today’s security landscape. What role is AI playing in your solutions?
AI plays a vital role in Motorola Solutions’ platforms. While we hear a lot about AI making decisions, in our case, AI helps collect and analyse data, but the final decision rests with the human managing it. This ensures accuracy and effectiveness in responding to security events.

]]>