CyberKnight – Security Review Magazine https://securityreviewmag.com We bring you the latest from the IT and physical security industry in the Middle East and Africa region. Wed, 14 May 2025 16:20:31 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://securityreviewmag.com/wp-content/uploads/2024/08/cropped-SRico-32x32.png CyberKnight – Security Review Magazine https://securityreviewmag.com 32 32 CyberKnight Sets Up South Africa Entity https://securityreviewmag.com/?p=28251 Wed, 14 May 2025 16:20:31 +0000 https://securityreviewmag.com/?p=28251 CyberKnight, a prominent regional cybersecurity advisory and value-added distributor, today announced the establishment of its local entity in Johannesburg, South Africa. The company has also appointed Wade Gomes as Country Manager for the SAADC (Southern African Development Community) region. This move underscores CyberKnight’s dedication to supporting the burgeoning Southern African market, where cybersecurity is increasingly becoming a top priority for organisations across various sectors.

“Wade Gomes’ appointment marks an important milestone for CyberKnight in Southern Africa. His deep industry knowledge, decades of experience and leadership will be instrumental as we expand our presence and work closely with our partners and customers,” said Yaadhna Singh Gounden, Regional Director for Sub-Saharan Africa. “Our goal is to enable organisations to navigate the complexities of today’s cybersecurity landscape with confidence, leveraging best-in-class solutions and proven frameworks.”

South Africa’s ongoing digital transformation, coupled with the rising sophistication of cyber threats, has driven a greater emphasis on implementing strong security solutions and adhering to regulatory compliance. The region’s cybersecurity market is characterised by a significant demand for advanced technologies, particularly in areas like cloud security, AI-powered threat detection, and managed security services. As businesses embrace digitalisation, they encounter new vulnerabilities, necessitating scalable and innovative solutions to safeguard sensitive data and ensure uninterrupted operations. The collaborative efforts between government, businesses, and technology providers to bridge skills gaps and strengthen defenses highlight the significant growth potential in the region.

“I’m excited to be part of CyberKnight’s journey in Southern Africa. The region is at a critical point in its cybersecurity evolution, and there’s a real opportunity to make a lasting impact, by combining local expertise with global experience. I’m honored and excited to lead this mission locally, with a goal to transform South Africa into one of CyberKnight’s hubs and a center of excellence, by helping customers stay ahead of threats while maximising the value of their cybersecurity investments,” added Wade Gomes, Country Manager at CyberKnight.

CyberKnight’s establishment in South Africa signifies its complete coverage across the African continent. The company brings its Zero Trust Security philosophy and a portfolio of leading global cybersecurity vendors to assist enterprise and government organisations throughout Africa in managing risk and enhancing resilience as they navigate evolving regulations and threats.

]]>
Video: CyberKnight on Zero Trust, AI, and Saudi Arabia’s Digital Transformation at GISEC Global 2025 https://securityreviewmag.com/?p=28220 Sun, 11 May 2025 14:27:09 +0000 https://securityreviewmag.com/?p=28220 In this interview, Samir Omar, General Manager – Sales-KSA at CyberKnight reveals CyberKnight’s key focus at GISEC 2025: navigating the new era of cybersecurity with Zero Trust strategies and the integration of AI and AIOps. He explains how CyberKnight is helping customers implement true Zero Trust frameworks in this rapidly evolving landscape. Discover how CyberKnight is actively contributing to Saudi Arabia’s digital transformation, as Samir explains their role as a trusted advisor and enabler, working closely with customers to understand their mission, goals, and vision to help them achieve success:

]]>
CyberKnight Partners with Ridge Security for AI-Powered Security Validation https://securityreviewmag.com/?p=28198 Thu, 08 May 2025 17:06:26 +0000 https://securityreviewmag.com/?p=28198 The automated penetration testing market was valued at roughly $3.1 billion in 2023 and is projected to grow rapidly, with forecasts estimating a compound annual growth rate (CAGR) between 21% and 25%. By 2030, the sector is expected to reach approximately $9 to $10 billion. The broader penetration testing industry is also expanding, with projections indicating it will surpass $5.3 billion by 2027, according to MarketandMarket.

To support enterprises and government entities across the Middle East, Turkey and Africa (META) with identifying and validating vulnerabilities and reducing security gaps in real-time, CyberKnight has partnered with Ridge Security, the World’s First Al-powered Offensive Security Validation Platform. Ridge Security’s products incorporate advanced artificial intelligence to deliver security validation through automated penetration testing and breach and attack simulations.

RidgeBot uses advanced AI to autonomously perform multi-vector iterative attacks, conduct continuous penetration testing, and validate vulnerabilities with zero false positives. RidgeBot has been deployed by customers worldwide as a key element of their journey to evolve from traditional vulnerability management to Continuous Threat Exposure Management (CTEM).

“Ridge Security’s core strength lies in delivering holistic, AI-driven security validation that enables organizations to proactively manage risk and improve operational performance,” said Hom Bahmanyar, Chief Enablement Officer at Ridge Security. “We are delighted to partner with CyberKnight to leverage their network of strategic partners, deep-rooted customer relations, and security expertise to accelerate our expansion plans in the region.”

“Our partnership with Ridge Security is a timely and strategic step, as 69% of organizations are now adopting AI-driven security for threat detection and prevention,” added Wael Jaber, Chief Strategy Officer at CyberKnight. “By joining forces, we enhance our ability to deliver automated, intelligent security validation solutions, reaffirming our commitment to empowering customers with resilient, future-ready cybersecurity across the region.”

]]>
CyberKnight Signs Netskope to Accelerate SASE Growth in Middle East https://securityreviewmag.com/?p=28173 Tue, 06 May 2025 16:51:33 +0000 https://securityreviewmag.com/?p=28173 The Secure Access Service Edge (SASE) market is projected to surge from $7 billion in 2022 to $25 billion by 2027, reflecting a robust 29% CAGR, according to Gartner. This remarkable growth highlights the urgent need for integrated, cloud-native, AI-ready security solutions as organizations across the Middle East and Africa accelerate digital transformation and embrace hybrid work models. In response, advanced protection against evolving cyber threats, seamless, high-performance access for users and devices, and security for the use of AI tools have all become critical business priorities.

CyberKnight and Netskope have officially signed a strategic value-added distribution partnership at the CyberKnight stand during GISEC 2025. Leveraging CyberKnight’s proven expertise and coverage, this collaboration aims to empower regional entities to modernize security and safeguard data across all sectors. The partnership ensures enteprise and government organizations can benefit from Netskope’s global innovation and local infrastructure to accelerate performance and get unprecedented visibility into any cloud, AI, web, and private application activity while reducing risks.

As a modern SASE and SSE solution, the Netskope One platform delivers unified data security and adaptive threat protection, combining CASB, SWG, ZTNA, DLP, DSPM and other capabilities with patented AI innovations that detect anomalies, block zero-day threats, and prevent data exfiltration across cloud and AI apps, endpoints, and IoT. With 70% of enterprises in the region now prioritizing AI-driven threat detection and zero-trust frameworks, Netskope’s cloud-native, AI-ready architecture and expansive NewEdge network provide the speed, resilience, and performance required for today’s digital enterprises.

“Netskope goes to market through a network of strategic partnerships and alliances across the region. We work closely with our channel partners who over many years have built strong relationships with enterprise customers and government, who rely on them to recommend and deliver modern cybersecurity solutions, essential to stay ahead of an ever-evolving threat landscape”. “Netskope was founded on the belief that continuous innovation is essential to help organizations modernize networks and security,” said Michael Herman, Vice President Channel Sales, EMEA & LATAM at Netskope”.

“Our partnership with CyberKnight, announced at GISEC 2025, will help expand our regional coverage, help our partners deliver modern cybersecurity solutions and better serve organizations in the region to protect data, securely enable AI usage and build cyber resilience for the future. Cyberknight is committed to building a comprehensive set of skills and services to help partners and customers deploy and deliver Netskope technology at scale. This will enable enterprises and governments to embrace digital transformation with confidence, knowing their users, data, and applications are protected by industry- leading, AI-centric security.”

“Partnering with Netskope marks a pivotal step in our mission to bring the world’s most advanced cloud and AI security to the region,” added Avinash Advani, Founder & CEO, at CyberKnight. “With our focus on technical excellence and Netskope’s cutting-edge platform, we will enable our customers to confidently navigate digital transformation, protect critical assets, and achieve compliance in an increasingly complex threat environment. This collaboration will ensure that organizations across the region have access to market-leading, best-of-breed technology to defend against cyber threats as they accelerate the journey to the cloud.”

]]>
CyberKnight Expands into Egypt with New Office https://securityreviewmag.com/?p=28078 Tue, 22 Apr 2025 14:34:40 +0000 https://securityreviewmag.com/?p=28078 CyberKnight has announced the official opening of its new Egypt representative office in New Cairo – District 5, reinforcing its commitment to the country’s rapidly evolving digital landscape. The inauguration ceremony took place on Tuesday, April 22nd. With Egypt emerging as a key technology and cybersecurity hub, CyberKnight’s further expansion into the country is a strategic move aligned with the growing awareness of cyber risks and the need for strong compliance measures. The representative office will serve as a center of excellence, supporting the company’s rapidly expanding customer and partner ecosystem across the Levant, Egypt and Africa (LEA) region.

“Opening our Egypt representative office reinforces the country’s vital role in our regional strategy,” said Naoufal Mzali, Senior Regional Director LEA at CyberKnight. “Egypt’s vibrant technology ecosystem and its position as a gateway to Levant and Africa make it an ideal location for one of CyberKnight’s centers of excellence. We are dedicated to empowering regional organizations with advanced cybersecurity solutions, while fostering innovation.”

With a reinforced presence, CyberKnight is well-positioned to accelerate its momentum in the region. Ahmed Elbahnihy, Regional Sales Manager Egypt at CyberKnight, added, “Our high-caliber business development and technical teams on-the-ground in Egypt allow us to build closer connections and a more credible reputation with local enterprise and government entities, and we are excited to be part of CyberKnight’s growing legacy here.”

CyberKnight has experienced remarkable growth over the past three years, achieving a 67% CAGR and expanding across 13 countries in the Middle East and Africa. By enhancing its local presence in Egypt, CyberKnight can now act as a true extension of its vendors’ teams to address the unique regulatory and threat management challenges of the LEA region.

]]>
CyberKnight to Showcase Zero Trust Security 2.0 at Gartner SRM and GISEC Global 2025 https://securityreviewmag.com/?p=28043 Mon, 07 Apr 2025 16:50:53 +0000 https://securityreviewmag.com/?p=28043 CyberKnight, cybersecurity focused value-added-distributor (VAD) and META’s leading Zero Trust Security advisor, proudly announces its participation at two of the region’s most influential cybersecurity events in Dubai: the Gartner Security & Risk Management Summit at Conrad Hotel on April 7-8, and GISEC Global 2025 (Gulf Information Security Expo & Conference) at DWTC on May 6-8.

Under the inspiring theme “Lead. Innovate. Secure with Zero Trust.”, CyberKnight will unveil the next evolution of its cybersecurity vision — Zero Trust Security 2.0. This advanced approach is designed to help regional organizations confidently navigate a rapidly shifting digital threat landscape while embracing GenAI developments, IT/OT convergence, cloud transformation, and regulatory compliance.

As a Premier Sponsor at Gartner SRM, CyberKnight will be joined by the following technology partners:

  1. CrowdStrike – EDR, Cloud Security & Threat Intel
  2. Immersive – Upskilling, TTX, Cyber Ranges, Crisis Simulation
  3. Gigamon – Deep Observability for Cloud & Network

As one of the most prominent exhibitors at GISEC Global 2025, CyberKnight will be joined by the following technology partners:

  1. CrowdStrike – EDR, Cloud Security & Threat Intel
  2. Immersive – Upskilling, TTX, Cyber Ranges, Crisis Simulation
  3. Checkmarx – Industry’s Most Comprehensive AppSec Platform
  4. Xage Security – Zero Trust Access & Protection across IT, OT, and Cloud
  5. Lookout – Mobile Threat Defense & App Security
  6. Netwrix – Data Governance & Active Directory Security
  7. Digital.ai – DevSecOps Orchestration & App Protection
  8. Elastic – SIEM, Big Data & Threat Analytics
  9. SolarWinds – IT Operations & Observability
  10. Appgate – Zero Trust Network Access (ZTNA), SDP
  11. ThreatConnect – Cyber Threat Intelligence and Risk Quantification
  12. GTB – Discovery & Classification, DLP, Watermarking, Device & App Control
  13. Ardent Security – Data privacy simplified and automated
  14. Cyware – Threat Intelligence Platform
  15. NetWitness – Evolved SIEM, UEBA, TDR & Network Forensics
  16. Wallarm – Advanced API Security

“While these events are ideal platforms to inspire action, share knowledge, and build alliances, – this year, we are taking Zero Trust Security to the next level. Our theme: Lead. Innovate. Secure with Zero Trust – captures our commitment to empowering organizations with the tools and expertise needed to stay resilient in a complex cyber world. CyberKnight will showcase cutting-edge solutions from its unified Zero Trust Security portfolio across identity, device, data, applications, visibility and analytics, governance and risk, as well as infrastructure security domains,” commented Vivek Gupta, Co-Founder and COO at CyberKnight.

]]>
AI-Powered Defense: How Generative AI Is Neutralizing Cyber Threats https://securityreviewmag.com/?p=27968 Mon, 24 Mar 2025 18:51:36 +0000 https://securityreviewmag.com/?p=27968 Shaahid Chitarah Amod, the Product Manager of OT/XIOT Business Unit for Levant and Egypt Africa Region at CyberKnight; and Muhammad Abdulla Marakkoottathil, the Senior Product Manager for Networking Business Unit, Gulf Region at CyberKnight, say generative AI is playing a significant role in enhancing cybersecurity measures today

How is generative AI being utilised to enhance cybersecurity measures today?
Shaahid Chitarah Amod: Generative AI in cybersecurity helps security teams stay ahead by simulating attacks, creating synthetic malware, and predicting threats. It boosts detection and response, making defenses smarter and more proactive. Generative AI is meant to take the guess work out of trouble shooting and work at a fast more autonomous pace.

Muhammad Abdulla Marakkoottathil: Generative AI is playing a significant role in enhancing cybersecurity measures today. Here are some key ways it’s being utilised:

  1. Threat Detection and Response: Generative AI models, such as Generative Adversarial Networks (GANs), are used to simulate potential cyber threats and identify vulnerabilities in systems before they can be exploited. This proactive approach helps in strengthening defenses.
  2. Automated Incident Response: AI can automate responses to security incidents, reducing the time it takes to mitigate threats. For example, AI can isolate affected systems, block malicious IP addresses, and even roll back changes made by malware.
  3. Phishing Detection: Generative AI can analyse vast amounts of data to detect phishing attempts. By understanding the patterns and techniques used in phishing emails, AI can flag suspicious messages with high accuracy
  4. Malware Analysis: AI models can analyse and classify malware more efficiently than traditional methods. They can identify new strains of malware by recognising patterns and behaviors that are indicative of malicious activity
  5. Enhancing Threat Intelligence: AI can process and analyse threat intelligence data from various sources, providing security teams with actionable insights. This helps in predicting and preventing potential attacks
  6. Improving Security Protocols: AI can continuously monitor and improve security protocols by learning from past incidents and adapting to new threats. This dynamic approach ensures that security measures are always up-to-date

Generative AI is indeed a double-edged sword, as it can also be used by malicious actors to create sophisticated threats. However, its potential to enhance cybersecurity measures is immense and continues to evolve rapidly.

What potential risks does generative AI introduce in the cybersecurity landscape, such as AI-driven cyberattacks?
Shaahid Chitarah Amod: Just as an IT Team would use Gen AI improves security, it also introduces new risks, like advanced malware, phishing scams, deepfakes, and bypassing security defenses. This could lead to more AI-driven attacks and data breaches. For example, attackers can use AI to generate advanced phishing emails and deepfake content, by using the AI engine to social engineer a persona.

Muhammad Abdulla Marakkoottathil: Generative AI introduces several potential risks in the cybersecurity landscape, particularly through AI-driven cyberattacks. Here are some key risks:

  1. Advanced Phishing and Social Engineering: Generative AI can create highly realistic and personalised phishing emails, making it difficult for individuals to distinguish between genuine and fraudulent communications. This increases the likelihood of successful phishing attacks.
  2. Deepfakes and Identity Impersonation: AI can generate convincing deepfake videos, audio, and images, which can be used to impersonate individuals, including high-profile targets. This can lead to identity theft, financial fraud, and reputational damage
  3. Evolving Malware: AI can be used to develop more sophisticated malware that can adapt and evolve to avoid detection by traditional security measures. This makes it harder for cybersecurity systems to keep up with new threats.
  4. Automated Attacks: AI can automate various stages of a cyberattack, from reconnaissance to execution. This increases the speed and scale at which attacks can be carried out, overwhelming traditional defense mechanisms.
  5. Data Privacy and Unauthorised Access: Generative AI systems can inadvertently expose sensitive data if not properly managed. Additionally, AI-driven attacks can exploit vulnerabilities to gain unauthorised access to data.
  6. AI-Powered Exploits: AI can identify and exploit vulnerabilities in software and systems more efficiently than human hackers. This can lead to more frequent and severe security breaches.
  7. Misinformation and Disinformation: Generative AI can be used to create and spread false information, which can have serious implications for public trust and security.

To mitigate these risks, organisations need to adopt advanced cybersecurity measures, including AI-driven defenses, continuous monitoring, and robust incident response strategies.

How can organisations leverage generative AI for proactive threat detection and response?
Shaahid Chitarah Amod: AI-driven threat detection leverages machine learning and deep learning algorithms to identify suspicious activities and potential security threats with greater accuracy. By detecting anomalies and correlating data across these inputs, AI enhances threat visibility, reduces false positives, and enables faster, more proactive security responses. Organisations can use AI in conjunction with Machine learning for:

  1. Threat Hunting: AI models analyse past attacks to predict future threats.
  2. Automated Security Playbooks: AI can recommend responses based on attack patterns.
  3. SOC Automation: AI assists Security Operations Centers by reducing manual workload.
  4. Vulnerability Management: AI scans software and suggests patches based on exploit trends.

Muhammad Abdulla Marakkoottathil: Organisations can leverage generative AI for proactive threat detection and response in several impactful ways:

  1. Simulating Cyberattacks: Generative AI can create realistic simulations of cyberattacks, allowing organisations to identify vulnerabilities and test their defenses. This helps in preparing for potential threats and improving overall security posture.
  2. Automated Threat Hunting: AI can continuously scan networks and systems for signs of malicious activity. By identifying patterns and anomalies, AI can detect threats that might go unnoticed by traditional methods.
  3. Enhanced Threat Intelligence: Generative AI can analyse vast amounts of data from various sources to provide actionable threat intelligence. This helps security teams stay ahead of emerging threats and make informed decisions.
  4. Dynamic Incident Response: AI can automate and coordinate responses to security incidents, reducing the time it takes to contain and mitigate threats. This includes isolating affected systems, blocking malicious IP addresses, and rolling back changes made by malware.
  5. Behavioral Analysis: AI can monitor user behavior to detect deviations that may indicate a security threat. By establishing a baseline of normal behavior, AI can identify and respond to suspicious activities in real-time.
  6. Predictive Analytics: AI can predict potential security breaches by analysing historical data and identifying trends. This allows organisations to take preventive measures before an attack occurs.
  7. Deception Technology: AI can create decoys and traps to lure attackers away from valuable assets. By interacting with these decoys, attackers reveal their tactics, which can then be analysed to improve defenses.

By integrating generative AI into their cybersecurity strategies, organisations can enhance their ability to detect, respond to, and prevent cyber threats more effectively.

What ethical concerns arise when using generative AI in cybersecurity, and how can they be addressed?
Shaahid Chitarah Amod: Key ethical concerns include:

  1. Privacy Violations: Generative AI models require large amounts of data, including potentially sensitive personal information. There’s a risk of privacy violations if AI systems are used to analyse or track user behavior for cybersecurity purposes,raising concerns about data collection, storage, and data usage.
  2. Bias in AI Models: AI decisions may be influenced by biases in training data.
  3. Accountability Issues: Determining responsibility for AI-driven security actions can be complex.

How to Address These Issues:

  1. Implement strict data governance policies.
  2. Regularly audit AI models for bias and fairness.
  3. Maintain human oversight for critical security decisions.

Muhammad Abdulla Marakkoottathil: Using generative AI in cybersecurity brings several ethical concerns, but there are ways to address them effectively. Here are some key concerns and potential solutions:

  1. Privacy Violations: Generative AI can process vast amounts of data, potentially leading to privacy breaches. To address this, organisations should implement strict data governance policies, ensuring that AI systems only access and process necessary data
  2. Bias and Discrimination: AI models can inherit biases from the data they are trained on, leading to unfair treatment of certain groups. Regular audits of AI systems and diverse training datasets can help mitigate these biases.
  3. Accountability and Transparency: When AI systems make autonomous decisions, it can be challenging to determine who is responsible for errors. Establishing clear accountability frameworks and maintaining transparency in AI decision-making processes are crucial
  4. Misinformation and Deepfakes: Generative AI can create realistic but false content, such as deepfakes, which can be used maliciously. Developing robust detection tools and promoting digital literacy can help combat the spread of misinformation
  5. Overreliance on AI: Relying too heavily on AI for cybersecurity can lead to complacency and reduced human oversight. Balancing AI automation with human expertise ensures a more resilient security posture
  6. Intellectual Property Concerns: Using copyrighted material to train AI models can lead to legal issues. Organisations should ensure they have the right to use the data and respect intellectual property laws

To address these ethical concerns, organisations can adopt the following strategies:

  1. Ethical AI Frameworks: Implementing ethical guidelines and frameworks for AI development and deployment can help ensure responsible use.
  2. Regular Audits and Monitoring: Conducting regular audits of AI systems to identify and rectify biases and other ethical issues.
  3. Transparency and Communication: Maintaining transparency in AI operations and clearly communicating AI’s role and limitations to stakeholders.
  4. Collaboration with Experts: Working with ethicists, legal experts, and cybersecurity professionals to develop and enforce ethical standards.

What challenges do cybersecurity teams face when integrating generative AI tools into their workflows?
Shaahid Chitarah Amod: Integrating AI into cybersecurity comes with several challenges. Organisations must navigate the complexity of ensuring AI tools seamlessly work with existing security systems while also addressing the shortage of skilled professionals trained in AI-driven cybersecurity. Another concern is the potential for false positives, which can overwhelm security analysts with excessive alerts, leading to alert fatigue. Finally, organisations must ensure that AI implementation complies with cybersecurity and privacy regulations, adding another layer of complexity to its adoption. It is also a mindset, where teams are fearful to change a system which took them months to perfect through customised configuration.

Muhammad Abdulla Marakkoottathil: Integrating generative AI tools into cybersecurity workflows presents several challenges for teams. Here are some of the key issues they face:

  1. Complexity and Expertise: Implementing generative AI requires specialised knowledge and skills. Many cybersecurity teams may lack the necessary expertise to effectively deploy and manage these advanced tools
  2. Data Privacy and Security: Ensuring that AI systems handle sensitive data securely is a major concern. There is a risk of data breaches if AI models are not properly secured
  3. Bias and Accuracy: AI models can inherit biases from the data they are trained on, leading to inaccurate threat detection and response. Regular audits and updates are needed to maintain accuracy and fairness
  4. Integration with Existing Systems: Integrating AI tools with existing cybersecurity infrastructure can be challenging. Compatibility issues and the need for significant modifications to current systems can hinder smooth integration
  5. Cost and Resource Allocation: Developing and maintaining AI systems can be expensive. Organisations need to allocate sufficient resources for training, deployment, and ongoing management of AI tools
  6. Regulatory Compliance: Adhering to regulatory requirements and ensuring that AI systems comply with data protection laws is crucial. This can be complex, especially with varying regulations across different regions
  7. Ethical Concerns: Addressing ethical issues, such as ensuring transparency and accountability in AI decision-making, is essential. Organizations must establish clear guidelines and frameworks to manage these concerns

Are there any notable examples of generative AI successfully preventing or mitigating cyberattacks?
Shaahid Chitarah Amod: Yes, some examples include: In March 2024, a pivotal vulnerability, CVE-2024-3094, was discovered within XZUtils, a component widely used in Linux. It received a severity score of 10, the highest possible. This marks one of the most substantial vulnerabilities discovered thus far in 2024. If not for its early discovery by a sharp-eyed researcher, this exploit could have made its way into mainstream Linux releases across global cloud and data center environments. Using a tool like XAGE, the AI engine would assist in faster detection of the above mention vulnerability. CrowdStrike has AI-powered solutions, including the Charlotte AI generative AI security assistant and AI-driven threat detection and response capabilities, to enhance cybersecurity and streamline analyst workflows

Muhammad Abdulla Marakkoottathil: Yes, there are several notable examples of generative AI successfully preventing or mitigating cyberattacks. CyberKnight Technologies is leveraging the power of generative AI to enhance its cybersecurity offerings and help its customers stay ahead of evolving threats. By integrating generative AI into solutions offered, CyberKnight is able to provide advanced threat detection, automated response, and comprehensive visibility across their clients’ network environments:

  1. Elastic AI Assistant for Security: It helps security teams by answering questions about Security, generating or translating natural language queries, providing context on alerts, and integrating with custom knowledge sources and it also provides context-aware guidance on alert triage, incident response, and administrative tasks, making it easier for security team to manage and respond to threats.
  2. Arista NDR: Arista NDR uses AI to autonomously detect and profile all devices within an enterprise network, including IoT and shadow IT devices. This comprehensivevisibility helps in identifying potential threats and vulnerabilities.
  3. Gigamon Deep Observability: By integrating generative AI with Gigamon’s GigaVUE Cloud Suite, the system can analyze vast amounts of network traffic data to identify unusual patterns and potential threats that traditional methods might miss
  4. IBM Watson: IBM Watson uses AI to analyse vast amounts of security data and identify potential threats. It can provide insights and recommendations for mitigating risks, helping organisations stay ahead of cyber threats
  5. VirusTotal Code Insight: VirusTotal, a subsidiary of Google, uses generative AI to analyse code snippets and produce natural language summaries. This helps in identifying malicious code and understanding its behavior, thereby preventing potential attacks

These examples demonstrate how generative AI can be a powerful tool in enhancing cybersecurity measures and protecting against sophisticated cyber threats.

How do you see generative AI evolving in the cybersecurity domain over the next few years?
Shaahid Chitarah Amod: Generative AI will likely evolve by becoming more autonomous, handling security tasks with little to no human input. Threat intelligence will evolve, with AI predicting cyber threats before they emerge, allowing for a more proactive defense. Incident response will be faster and more efficient as AI-driven automation minimises delays. AI will also play a key role in enforcing Zero Trust security models, ensuring strict access controls and continuous verification. Additionally, attack simulations will become more advanced, enabling organisations to anticipate and defend against increasingly sophisticated cyber threats.

Muhammad Abdulla Marakkoottathil: Generative AI is poised to significantly evolve in the cybersecurity domain over the next few years. Here are some key trends and predictions:

  1. Enhanced Threat Detection: Generative AI will continue to improve in identifying and predicting cyber threats. By analysing vast amounts of data, AI can detect patterns and anomalies that indicate potential attacks, allowing for quicker and more accurate threat detection
  2. Automated Incident Response: AI-driven automation will become more sophisticated, enabling faster and more effective responses to security incidents. This includes isolating affected systems, blocking malicious activities, and even rolling back changes made by malware
  3. Proactive Defense Mechanisms: AI will be used to simulate potential cyberattacks and identify vulnerabilities before they can be exploited. This proactive approach will help organisations strengthen their defenses and reduce the risk of successful attacks
  4. Integration with DevSecOps: As attackers increasingly target the software development lifecycle, AI will play a crucial role in securing development environments. This includes automated code reviews, vulnerability scanning, and ensuring compliance with security best practices
  5. AI vs. AI: The cybersecurity landscape will see a rise in AI-driven attacks, leading to an “AI vs. AI” scenario where defensive AI systems must constantly adapt to counteract evolving AI-powered threats
  6. Improved User Behavior Analysis: AI will enhance the ability to monitor and analyse user behavior, detecting anomalies that may indicate insider threats or compromised accounts. This will help in preventing data breaches and unauthorised access
  7. Ethical and Regulatory Considerations: As AI becomes more integrated into cybersecurity, there will be increased focus on ethical considerations and regulatory compliance. Organisations will need to ensure transparency, accountability, and fairness in their AI systems.

Overall, generative AI will play a crucial role in transforming cybersecurity, making it more proactive, efficient, and adaptive to emerging threats.

What role does human oversight (HITL) play in ensuring generative AI systems are effectively managing cybersecurity threats?
Shaahid Chitarah Amod: Human-in-the-loop (HITL) oversight is crucial for:

  • Validating AI Decisions: Security analysts must verify AI-generated alerts.
  • Reducing False Positives: Human review ensures AI does not mistakenly block customised activity, or system.

Threat actors will use the AI tools to drive enforce false positive, IT Experts will need continuously refine AI training data to improve accuracy. AI may not recognise entirely new attack methods, requiring human intervention. Bringing humans into the mix makes AI more adaptable, letting models evolve with real-world changes and user needs. By keeping that human touch, we make sure machine learning systems can handle the complexities and nuances that pure algorithms might miss.

Muhammad Abdulla Marakkoottathil: Human oversight, often referred to as Human-in-the-Loop (HITL), plays a crucial role in ensuring that generative AI systems effectively manage cybersecurity threats. Here are some key aspects of this role:

  1. Complex Decision-Making: While AI can automate many tasks, complex decision-making often requires human intuition and contextual understanding. Security analysts can interpret AI-generated insights and make informed decisions based on the broader business context
  2. Bias and Error Mitigation: AI systems can inherit biases from their training data, leading to inaccurate threat detection. Human oversight helps identify and correct these biases, ensuring more accurate and fair outcomes
  3. Ethical Considerations: Humans are essential for addressing ethical concerns related to AI use, such as privacy violations and transparency. They can ensure that AI systems operate within ethical guidelines and regulatory frameworks
  4. Continuous Improvement: Human feedback is vital for the continuous improvement of AI systems. By monitoring AI performance and providing feedback, humans help refine algorithms and enhance their effectiveness over time
  5. Incident Response: In the event of a security incident, human oversight ensures that responses are appropriate and proportionate. While AI can automate initial responses, humans can assess the situation and take necessary actions to mitigate the threat

How can smaller organisations with limited budgets incorporate generative AI for cybersecurity?
Shaahid Chitarah Amod: Smaller organisations can:

  1. Use open-source AI security tools like OpenAI’s GPT security models.
  2. Leverage cloud-based AI security services (e.g., Microsoft Defender, AWS GuardDuty).
  3. Focus on AI-driven endpoint protection to reduce costs.
  4. Partner with MSSPs (Managed Security Service Providers) for AI-driven security solutions.

Muhammad Abdulla Marakkoottathil: Smaller organisations with limited budgets can still effectively incorporate generative AI for cybersecurity by following these strategies:

  1. Leverage Affordable AI Tools: There are cost-effective AI cybersecurity tools available that provide robust protection without breaking the bank. Tools like LLM Guard for cost-effective CPU inference and Protect AI for easy customisation can be great options.
  2. Cloud-Based Solutions: Opt for cloud-based AI cybersecurity solutions, which often come with lower upfront costs and scalable pricing models. Services like CrowdStrike Falcon offer comprehensive protection with flexible pricing
  3. Open-Source AI Tools: Utilise open-source AI tools and frameworks. Projects like Snort for intrusion detection and OSSEC for host-based intrusion detection are free and can be customised to meet specific needs
  4. Collaborate with Managed Security Service Providers (MSSPs): Partnering with MSSPs can provide access to advanced AI-driven cybersecurity tools and expertise without the need for significant in-house investment
  5. Focus on Key Areas: Prioritise AI implementation in critical areas such as threat detection, phishing prevention, and automated incident response. This targeted approach ensures maximum impact with limited resources.

What best practices would you recommend for implementing generative AI tools while minimising risks?
Shaahid Chitarah Amod: Best practices include:

  1. Ensure AI Explainability: Use AI models that provide transparent decision-making insights.
  2. Implement Strong Data Governance: Protect sensitive data used in AI models.
  3. Use Multi-Layered Security: AI should complement, not replace, traditional security measures.
  4. Monitor AI Performance: Regularly audit AI-generated outputs for accuracy and fairness.
  5. Keep Human Oversight: Always have cybersecurity professionals reviewing AI actions.
  6. Training: focus on internal training for staff on AI principle to ensure all stake holders understand AI advantages and risk factors.

Muhammad Abdulla Marakkoottathil: Implementing generative AI tools while minimising risks involves several best practices. Here are some key recommendations:

  1. Data Security and Privacy: Ensure that AI systems handle data securely. Implement robust data encryption, access controls, and regular audits to protect sensitive information
  2. Bias Mitigation: Regularly audit AI models to identify and correct biases. Use diverse and representative datasets to train AI systems, and continuously monitor their outputs for fairness
  3. Transparency and Explainability: Maintain transparency in AI operations. Ensure that AI decisions are explainable and that stakeholders understand how AI systems work and make decisions
  4. Ethical Guidelines: Develop and adhere to ethical guidelines for AI use. This includes respecting user privacy, avoiding harmful applications, and ensuring that AI systems are used responsibly
  5. Human Oversight: Incorporate Human-in-the-Loop (HITL) mechanisms to ensure that critical decisions involve human judgment. This helps in mitigating risks associated with fully autonomous AI systems
  6. Regulatory Compliance: Stay updated with relevant regulations and ensure that AI systems comply with data protection and privacy laws. This includes understanding and adhering to regional and industry-specific requirements
  7. Continuous Monitoring and Improvement: Regularly monitor AI systems for performance and security issues. Implement feedback loops to continuously improve AI models and address any emerging risks
  8. Incident Response Plans: Develop and maintain robust incident response plans to quickly address any security breaches or AI system failures. This includes regular drills and updates to the response strategies

By following these best practices, organisations can effectively implement generative AI tools while minimising associated risks.

]]>
CyberKnight Appoints Regional Sales Director for the Gulf Region https://securityreviewmag.com/?p=27661 Wed, 15 Jan 2025 06:42:05 +0000 https://securityreviewmag.com/?p=27661 CyberKnight has appointed Rabih Itani as the Regional Sales Director for the Gulf region. With over two decades of experience in technology sales and a proven track record of driving business growth, Rabih will lead CyberKnight’s sales strategy and operations across the United Arab Emirates, Bahrain, Kuwait, Oman and Qatar. Having held key roles at globally recognized organizations, he has built a strong reputation for driving market growth and fostering customer relationships.

Rabih Itani’s appointment comes at a pivotal moment for CyberKnight, as the company continues to expand its regional presence and strengthen its position as a thought leader in Zero Trust Security. With deep expertise in the cybersecurity domain as well as building high-performing sales teams, Rabih will play a key role in enabling CyberKnight to achieve ambitious growth targets while delivering value to our regional ecosystem. Rabih will oversee sales operations, develop market strategies, and support CyberKnight’s customers and partners with innovative cybersecurity solutions.

“We are delighted to have Rabih join our leadership team. His strategic mindset and regional acumen align perfectly with our growth objectives in the Gulf. Rabih’s exceptional experience and deep understanding of regional dynamics make him the ideal choice to further solidify our position as the trusted cybersecurity advisor in the Gulf. As CyberKnight continues its mission to revolutionize the cybersecurity landscape across the region, Rabih’s leadership will ensure we are well-equipped to continue supporting our customers with precision and agility,” commented Avinash Advani, Founder and CEO at CyberKnight.

“I’m honoured to take on this role and excited to help grow CyberKnight’s impact in the Gulf and contribute to the region’s cyber resilience. This market is evolving rapidly, and there is an increasing demand for advanced critical cybersecurity frameworks like Zero Trust. My focus will be on leveraging our strength in Zero Trust Security to address key market demands and build enduring relationships. I look forward to working closely with our talented team and dedicated partners to address our customers’ emerging challenges effectively,” commented Rabih Itani, Regional Sales Director – Gulf at CyberKnight.

]]>
CyberKnight Reports 51% Year-on-Year Revenue Growth in 2024 https://securityreviewmag.com/?p=27629 Wed, 08 Jan 2025 16:20:33 +0000 https://securityreviewmag.com/?p=27629 CyberKnight has announced its fifth anniversary, marking a half-decade of accelerated growth and innovation. Coinciding with this milestone, the company has released its 2024 results. CyberKnight had record bookings and revenue in the fourth quarter ending December 31, 2024, as well as for the full year.

Highlights of 2024:

  • Achieved 51% revenue growth in 2024, showcasing exceptional performance.
  • Maintained a 3-year CAGR of 67%, reflecting consistent and resilient growth.
  • Reported robust financial health and operational efficiency through strong P&L and EBITDA, which has been positive since inception.
  • Transacted with 439 resellers to support 890 end-users across the region, demonstrating comprehensive channel and market coverage.
  • Processed 36 deals with $500K+ value, highlighting the significant volume of the business.
  • Partnerships with new resellers added 22% of revenue and new end customers added 47% of revenue, aligning with market needs and highlighting trust in our offerings.
  • Operations spanned 10 countries and regions: UAE, Saudi Arabia, Qatar, Kuwait, Oman, Bahrain, Levant, North Africa, Egypt and Central, East & West Africa (CEWA).
  • Solutions deployed in 25 countries, solidifying a trusted regional presence.

Founded to transform the regional cybersecurity landscape, CyberKnight has emerged as a trendsetter by championing the adoption of Zero Trust Security and delivering cutting-edge security solutions across the region. Over five years, the company has expanded operations into 10 strategic markets in the META region, built a robust Zero Trust Security portfolio of 35 technology vendors, and grown its workforce to over 100 experienced professionals.

“In just five years, we have firmly established ourselves as a leader in the regional cybersecurity ecosystem, thanks to the trust and partnership of our customers, resellers, vendors and the dedication of our employees. Achieving such tremendous growth in such a short period reflects our team’s relentless commitment to enabling organisations in the META region to secure their digital assets while achieving compliance. With such momentum, we are aiming for even greater heights in the years ahead,” commented Avinash Advani, Founder and CEO at CyberKnight.

“Throughout 2024, CyberKnight continued to drive impactful initiatives, including its renowned flagship regional roadshow themed “Beyond Resilience: Zero Trust Security 2.0,” which reached over 1,200 cybersecurity leaders across nine markets this year: UAE, Saudi Arabia, Qatar, Kuwait, Oman, Bahrain, Jordan, Morocco and Egypt. The company also enhanced its technology portfolio to address critical areas such as AI and data privacy, ensuring its resellers remain differentiated and customers stay at the forefront of defending against the ever-evolving threat landscape,” added Vivek Gupta, Co-Founder and COO at CyberKnight.

]]>
CyberKnight Appoints Regional Sales Director for CEWA https://securityreviewmag.com/?p=27484 Wed, 27 Nov 2024 11:30:56 +0000 https://securityreviewmag.com/?p=27484 CyberKnight has announced its strategic expansion into the Central, East, and West Africa (CEWA) region, reflecting its commitment to extending cybersecurity expertise and building resilient ecosystems across emerging markets. As part of this regional growth, CyberKnight has appointed Yaadhna Singh Gounden as the Regional Sales Director, CEWA & IOI (Indian Ocean Islands), to support enterprises and government organizations across CEWA to embrace the Zero Trust Security model, helping to safeguard critical assets and meet complex compliance mandates.

With over 17 years of extensive experience in cybersecurity and IT Distribution, Yaadhna brings a wealth of expertise in managing customer and partner relationships and driving business development across the African region. With the CEWA expansion, CyberKnight continues its focus on capacity building, offering advanced cybersecurity technologies and expertise that empower enterprises to tackle evolving threats. The company will leverage its extensive portfolio of Zero Trust solutions, combined with Yaadhna’s leadership, to deliver actionable strategies that enhance regional cyber defences.

“CEWA expansion with the regional key hire marks an important milestone for CyberKnight. This market is witnessing rapid digital adoption and an increasing focus on cybersecurity resilience. CyberKnight’s expansion seeks to address the rising need for advanced solutions and expertise to help enterprises and governments in the region secure their digital ecosystems. Our goal is to bring effective and pragmatic cybersecurity strategies along with Zero Trust Security framework while addressing region-specific challenges,” commented Avinash Advani, Founder and CEO at CyberKnight.

“Joining CyberKnight during such a pivotal time is an exciting opportunity. The challenges in CEWA’s cybersecurity landscape demand tailored approaches. My focus will be on fostering trust, strengthening partnerships, and ensuring that our solutions not only protect but enable businesses to thrive in an increasingly digital world. I look forward to collaborating with our customers and partners while helping CyberKnight deliver on its mission to expand Zero Trust Security across emerging markets,” commented Yaadhna Singh Gounden, Regional Sales Director, CEWA & IOI.

]]>