Chris Fernando – Security Review Magazine https://securityreviewmag.com We bring you the latest from the IT and physical security industry in the Middle East and Africa region. Wed, 14 May 2025 15:15:07 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://securityreviewmag.com/wp-content/uploads/2024/08/cropped-SRico-32x32.png Chris Fernando – Security Review Magazine https://securityreviewmag.com 32 32 ManageEngine Enhances PAM with Native Intelligence https://securityreviewmag.com/?p=28248 Wed, 14 May 2025 15:15:07 +0000 https://securityreviewmag.com/?p=28248 ManageEngine, the enterprise IT management division of Zoho Corporation, today announced significant upgrades to its PAM360 privileged access management platform. The enhancements include AI-powered features for intelligent least privilege access and risk remediation policy recommendations, alongside a new privileged task automation module powered by Zoho’s Qntrl workflow orchestration platform. These additions aim to help businesses automate administrative tasks, enforce least privilege at scale with smart, context-aware controls, and minimize security risks through automated remediation.

The company also highlighted the limitations of traditional PAM models relying on static policies and manual processes, often lacking crucial context and leading to excessive permissions and security vulnerabilities. Their 2024 Identity Security Insights report indicated that 68% of respondents are seeking AI-driven improvements in risk-based access control.

“Today’s hybrid, multi-cloud environments have led to an explosion of human and non-human identities, creating complex access workflows and rampant privilege sprawl. To tackle this, organizations require dynamic policies that can intelligently enforce the principle of least privilege across their identity stack. With the AI-driven CIEM module in PAM360, IT security teams can now generate intelligent least privilege policies, proactively flag risky entitlements and automate remediation, helping enterprises close critical identity security gaps before they’re exploited,” said Ramanathan Kannabiran, director of product management at ManageEngine.

Addressing this need, PAM360’s Cloud Infrastructure Entitlement Management (CIEM) module now incorporates AI-generated least privilege policies, automated remediation of shadow admin risks, and real-time access and session summaries. These AI-powered capabilities enable organizations to proactively combat access sprawl and misconfigurations in hybrid environments with minimal manual intervention.

ManageEngine also addressed the inefficiencies and potential security gaps associated with business workflows using RPA and script-based automation that often rely on manual access provisioning. Modern IT teams require dynamic controls to streamline on-demand access within these automated workflows and bolster overall security.

According to Kannabiran, “Privileged task automation in PAM360 eliminates the need for administrators to manually grant and revoke necessary access privileges for every automated routine. Access is provisioned just in time, based on the task context, and revoked automatically once the task ends. This not only preserves admin bandwidth, but also reduces the risk of privilege misuse caused by excessive or standing access.”

Leveraging Zoho’s Qntrl, PAM360 now offers native automation capabilities, eliminating the need for third-party tools. This deep integration within the Zoho ecosystem allows for seamless orchestration of privileged access workflows, enhancing efficiency without compromising security. PAM360 streamlines vendor access with automated onboarding and offboarding, provisions temporary, just-in-time access with granular, time-bound controls, and ensures secure, hands-free transfer of privileged data – delivering speed, consistency, and reduced risk across the organization.

]]>
Axis Communications Sheds Light on Video Surveillance Industry Perspectives on AI https://securityreviewmag.com/?p=28241 Mon, 12 May 2025 18:21:18 +0000 https://securityreviewmag.com/?p=28241 Axis Communications has published a new report that explores the state of AI in the global video surveillance industry. Titled The State of AI in Video Surveillance, the report examines the key opportunities, challenges and future trends, as well as the responsible practices that are becoming critical for organisations in their use of AI. The report draws insights from qualitative research as well as quantitative data sources, including in-depth interviews with carefully selected experts from the Axis global partner network.

A leading insight featured in the report is the unanimous view among interviewees that interest in the technology has surged over the past few years, with more and more business customers becoming curious and increasingly knowledgeable about its potential applications.

Mats Thulin, Director AI & Analytics Solutions at Axis Communications

“AI is a technology that has the potential to touch every corner and every function of the modern enterprise. That said, any implementations or integrations that aim to drive value come with serious financial and ethical considerations. These considerations should prompt organisations to scrutinise any initiative or investment. Axis’s new report not only shows how AI is transforming the video surveillance landscape, but also how that transformation should ideally be approached,” said Mats Thulin, Director AI & Analytics Solutions at Axis Communications.

According to the Axis report, the move by businesses from on-premise security server systems to hybrid cloud architectures continues at pace, driven by the need for faster processing, improved bandwidth usage and greater scalability. At the same time, cloud-based technology is being combined with edge AI solutions, which play a crucial role by enabling faster, local analytics with minimal latency, a prerequisite for real-time responsiveness in security-related situations.

By moving AI processing closer to the source using edge devices such as cameras, businesses can reduce bandwidth consumption and better support real-time applications like security monitoring. As a result, the hybrid approach is expected to continue to shape the role of AI in security and unlock new business intelligence and operational efficiencies.

A trend that is emerging among businesses is the integration of diverse data for a more comprehensive analysis, transforming safety and security. Experts predict that by integrating additional sensory data, such as audio and contextual environmental factors caught on camera, can lead to enhanced situational awareness and greater actionable insights, offering a more comprehensive understanding of events.

Combining multiple data streams can ultimately lead to improved detection and prediction of potential threats or incidents. For example, in emergency scenarios, pairing visual data with audio analysis can enable security teams to respond more quickly and precisely. This context-aware approach can potentially elevate safety, security and operational efficiency, and reflects how system operators can leverage and process multiple data inputs to make better-informed decisions.

According to the Axis report, interviewees emphasised that responsible AI and ethical considerations are critical priorities in the development and deployment of new systems, raising concerns about decisions potentially based on biased or unreliable AI. Other risks highlighted include those related to privacy violations and how facial and behavioural recognition could have ethical and legal repercussions.

As a result, a recurring theme among interviewees was the importance of embedding responsible AI practices early in the development process. Interviewees also pointed to regulatory frameworks, such as the EU AI Act, as pivotal in shaping responsible use of technology, particularly in high-risk areas. While regulation was broadly acknowledged as necessary to build trust and accountability, several interviewees also stressed the need for balance to safeguard innovation and address privacy and data security concerns.

“The findings of this report reflect how enterprises are viewing the trend of AI holistically, working to have a firm grasp of both how to use the technology effectively and understand the macro implications of its usage. Conversations surrounding privacy and responsibility will continue but so will the pace of innovation and the adoption of technologies that advance the video surveillance industry and lead to new and exciting possibilities,” Thulin added.

]]>
Positive Technologies @ GISEC Global 2025: Demonstrating Cutting-Edge Cyber Threats and AI Defense Strategies https://securityreviewmag.com/?p=28233 Mon, 12 May 2025 11:51:35 +0000 https://securityreviewmag.com/?p=28233 At GISEC Global 2025, Positive Technologies showcased live demonstrations of sophisticated hacking techniques while emphasising the growing role of AI in both cyber attacks and defense. In an exclusive interview with Security Review, Ilya Leonov, the Regional Director at Positive Technologies revealed insights about the Middle East’s evolving threat landscape, their work with regional governments, and why investing in human expertise remains critical despite advancing technologies

Could you tell us about Positive Technologies’ presence at this year’s GISEC event and the solutions you’re showcasing?
This year at GISEC, we’re presenting our latest cybersecurity solutions with a strong focus on hands-on, practical expertise. At our stand, we’re demonstrating sophisticated attack techniques like direct memory access attacks and full injection attacks – these show just how easily devices like laptops can be compromised. We’ve also significantly expanded our Hackosphere area compared to last year, featuring interactive engagements including soldering, device hacking, fixed attacks, and stenography challenges. We’ve doubled the size of this interactive space and hope to see twice the engagement as well.

How does participating in this event help you engage with regional companies?
We’re seeing tremendous participation from across industries – government representatives, oil and gas companies, financial institutions, and many partners. GISEC has established itself as one of the most efficient and prominent cybersecurity events not just in the UAE, but across the entire Middle East region.

Could you share your observations about the current threat landscape in the region and how you’re helping companies address these challenges?
Through our Threat Research Center – the largest in Eastern Europe – we continuously monitor critical infrastructure and analyse activity across the deep and dark web globally. In the Middle East specifically, we’re observing significant activity from APT groups, including state-sponsored hackers and hacktivists targeting critical national infrastructure. Their methods typically involve compromising internal organisational systems or creating backdoors, which they often then sell access to on dark web markets.

What challenges are companies facing regarding AI-powered attacks?
AI is undoubtedly the hot topic in cybersecurity right now. While AI capabilities are becoming increasingly sophisticated and powerful, I firmly believe human expertise remains irreplaceable. That said, we’re seeing substantial AI integration from both sides – threat actors are leveraging it for attacks while cybersecurity professionals are using it for defense. This dual adoption is creating significant impacts, and we anticipate this trend will continue growing over the next 5-10 years.

Are you collaborating with any local entities or governments to address these AI-related security challenges?
Absolutely. We’re actively working with local partners, government agencies, and regional companies to help them understand the AI threat landscape and demonstrate how AI and machine learning can be effectively used to protect their infrastructure.

What key advice would you give regional organisations looking to improve their security posture?
My fundamental recommendation is to invest in human capital. Knowledge and expertise are assets you can’t simply purchase – they need to be developed. An organisation might have the best security tools and infrastructure, but without capable personnel, these resources become ineffective. This is why we emphasise sharing our expertise – not just in defense strategies, but in incident response, investigations, and most importantly, in building local capabilities to elevate overall cybersecurity maturity levels.

]]>
Video: Wallarm Unveils the Key to Cloud-Native API Security at GISEC Global 2025 https://securityreviewmag.com/?p=28223 Sun, 11 May 2025 14:37:47 +0000 https://securityreviewmag.com/?p=28223 In this insightful interview, Ammar Affani, Regional Sales Director, META at Wallarm, unveils his company’s core value proposition: providing cutting-edge protection for modern cloud-native applications with a strong focus on API security, discovery, visibility, and control. Learn how Wallarm empowers organizations to identify API leaks, unused or shadow APIs, and gain comprehensive security insights. With the rise of open banking and interconnected services, Ammar highlights the increasing threat landscape targeting APIs. He further explains how Wallarm offers real-time detection and blocking to safeguard sensitive user credentials and ensure robust API protection:

]]>
Video: CyberKnight on Zero Trust, AI, and Saudi Arabia’s Digital Transformation at GISEC Global 2025 https://securityreviewmag.com/?p=28220 Sun, 11 May 2025 14:27:09 +0000 https://securityreviewmag.com/?p=28220 In this interview, Samir Omar, General Manager – Sales-KSA at CyberKnight reveals CyberKnight’s key focus at GISEC 2025: navigating the new era of cybersecurity with Zero Trust strategies and the integration of AI and AIOps. He explains how CyberKnight is helping customers implement true Zero Trust frameworks in this rapidly evolving landscape. Discover how CyberKnight is actively contributing to Saudi Arabia’s digital transformation, as Samir explains their role as a trusted advisor and enabler, working closely with customers to understand their mission, goals, and vision to help them achieve success:

]]>
Video: SANS Institute Weighs in on Deepfakes, Model Poisoning and Risk Frameworks at GISEC Global 2025 https://securityreviewmag.com/?p=28217 Sat, 10 May 2025 14:57:15 +0000 https://securityreviewmag.com/?p=28217 In this video, Rob T. Lee, Chief of Research at the SANS Institute discuses the biggest AI-related cybersecurity threats that organizations will face in 2025. He dissects adversarial AI attacks, such as model poisoning and deepfake phishing, and clearly explaining how these sophisticated threats differ significantly from traditional cyber attacks.

Deploying AI without a security-first mindset can be perilous and Rob outlines the significant risks enterprises face if they implement AI without proper security safeguards in place. Navigating this new terrain requires a strategic approach, as Rob touches upon what a “risk-based” AI security framework looks like and provides actionable steps on how organizations should begin building one to protect their AI deployments:

]]>
Video: SentinelOne Speaks Hyperautomation, Purple AI, and the Future of Threat Detection at GISEC Global 2025 https://securityreviewmag.com/?p=28213 Sat, 10 May 2025 14:40:54 +0000 https://securityreviewmag.com/?p=28213 Ezzeldin Hussein, Regional Senior Director, Solution Engineering, META, SentinelOne joined us for a fascinating chat! In this video, we dove deep into how SentinelOne’s Singularity Hyperautomation is revolutionising security operations. Discover what makes SentinelOne’s Purple AI different and a TRUE game-changer, and witness how AI is enabling instant real-time threat detection and action. Learn how AI boosts accuracy and silences the noise. Finally, get Ezzeldin’s predictions for the next 5 years of AI-powered security:

]]>
Video: Tenable Discusses Strategies for Smarter Security and OT Protection at GISEC Global 2025 https://securityreviewmag.com/?p=28210 Sat, 10 May 2025 14:14:13 +0000 https://securityreviewmag.com/?p=28210 Bernard Montel, EMEA Technical Director and Security Strategist at Tenable, spoke to us at GISEC Global 2025! He highlighted Tenable’s latest cybersecurity solutions and vulnerability intelligence, showing how they improve risk prioritisation. We discussed the rising importance of OT security in the Middle East, AI’s impact on ransomware defense, challenges in securing legacy OT, and Tenable’s exploration of generative AI for threat detection and more:

]]>
Video: OPSWAT Rethinks Firewalls and Gulf Cybersecurity at GISEC Global 2025 https://securityreviewmag.com/?p=28205 Fri, 09 May 2025 14:43:16 +0000 https://securityreviewmag.com/?p=28205 OPSWAT CEO Benny Czarny joins us at GISEC Global 2025! He explains why the event is key for OPSWAT and previews their latest solutions. Benny also argues for a firewall rethink, highlighting traditional vulnerabilities and OPSWAT’s unique network protection approach. We also discuss the cybersecurity risks and opportunities of rapid digital transformation in Gulf countries and why the Middle East’s critical infrastructure is particularly vulnerable today. Tune in for crucial insights:

]]>
42 Abu Dhabi and CTF.ae Sign MoU https://securityreviewmag.com/?p=28195 Thu, 08 May 2025 16:22:27 +0000 https://securityreviewmag.com/?p=28195 42 Abu Dhabi, the UAE capital’s innovative and disruptive coding academy, signed a Memorandum of Understanding (MoU) with CTF.ae, a leading organization specializing in hosting world-class Capture The Flag (CTF) competitions and advanced cyber drills. The agreement was signed during GISEC Global 2025, held at the Dubai World Trade Center from 6-8 May. In the presence of Dr. Mohamed AlKuwaiti, Head of Cyber Security for the UAE Government, the agreement was signed by Dr. Ahmed Al Shoaibi, Acting CEO of 42 Abu Dhabi and Ahmed Attalla, COO of CTF.ae.

This strategic collaboration aims to nurture future-ready tech talent and strengthen Abu Dhabi’s position as a global hub for cybersecurity excellence. Under the MoU, CTF.ae will offer internship opportunities for 42 Abu Dhabi students, providing them with hands-on industry exposure and real-world experience in tackling complex cybersecurity challenges. In addition, both parties will collaborate to deliver expert-led talks, workshops, and training sessions focusing on career pathways and emerging technologies.

Joint efforts will also include the organization of industry-themed hackathons, innovation challenges, conferences, youth circles, and networking events to promote a culture of collaboration and continuous learning. Dr. Ahmed Al Shoaibi, Acting CEO of 42 Abu Dhabi said: ” Our collaboration with CTF.ae is a key milestone in our mission to empower students with real-world cybersecurity expertise and future-proof their careers. By connecting our project-based learning model with CTF.ae’s industry-leading platforms and experiences, we are reinforcing Abu Dhabi’s vision to build a knowledge-based economy, while supporting the UAE’s broader ambitions to become a global leader in cybersecurity innovation. We look forward to seeing our students lead and shape the future of this critical sector.”

Mr. Ahmed Atalla, COO of CTF.ae added, “Working together with 42 Abu Dhabi allows us to connect with the country’s most talented and motivated students, giving them access to realistic cybersecurity scenarios and challenges to expand their skillset and prepare them for the evolving digital landscape of tomorrow. We have seen the passion of the 42 Abu Dhabi students over previous years, and now is the time to provide them with a cybersecurity exercise platform that keeps them engaged year-round, preparing them to compete globally and achieve top ranks representing the nation.”

As part of this collaboration, 42 Abu Dhabi has coordinated with CTF.ae to host an Attack/Defense Capture the Flag (CTF) competition on its campus. The event was held over two days, with an Attack/Defense CTF Workshop scheduled for April 29, followed by the Attack/Defense CTF Competition on April 30.

]]>