GISEC
GISEC 2021: Companies Are Strengthening Cloud Tech to Accelerate Digital Transformation

Amit Hooja, the CEO of NetGraph, speaks about the security challenges faced by companies in the region
How has the security threat landscape evolved over the past few months?
It is evident that the brains behind cyber attacks seem to be in overdrive in the last few years. We can expect the number of released vulnerabilities to be almost double compared to the previous years. Also, given the current environment with more people working from home, the organizational permitters have changed and we are witnessing a huge surge in events at individual workstations which are mostly neutralized by our security ops. But what is now emerging and we are experiencing, is that the number of security events with our customers has almost quadrupled each month.
What sort of security challenges are people facing when working from home and how is your company equipped to handle those challenges?
In forced circumstances, and since people are working from homes, dorms, shared rooms, etc, there are attacks on enterprise hardware that are otherwise secured by enterprise firewalls. This has given the opportunity to hop into the scene and break into other targets within organizations. Under normal circumstances, this hardware within physical security would be more trusted and have privileges that would be better than any other network.
Most of what is currently happening are due to connections via VPN into organizations. Also, the large amount of data being exposed on these machines can be further explored for further attacks. Companies should focus on a lot of endpoint security and deploying Extended Detection and Response (XDR) on user machines. This enables a great amount of behavioral analysis on user machines and protects the machines as well as the network.
How has ransomware evolved during the pandemic period and what are you doing to tackle the problem?
We are seeing much more advanced ways being evolved in the delivery of ransomware, where the vehicles are getting much more innovative and intelligent and are able to detect the environment and inject appropriate payloads. We are also seeing advancements in how the payloads are delivered and hence staying invisible from most of the otherwise known techniques to detect ransomware. NetGraph initiates a lot of deep ransomware analysis.
How can companies overcome digital security and privacy challenges?
As a Managed Security Service Provider, what we enforce and educate our clients is that the first step is self-realization in the company’s need to lay adequate stress on the organizations’ security. Especially at a time when most companies both the larger enterprise as well as small and medium-size businesses are dealing with a huge amount of employee as well as customer data that are prone to threats. Having an in-house CISO or appointing external security operators is important to ensure a healthy security outlook and approach.
They help in analyzing the threat surface, taking corrective action, and future-proofing the organization’s security. Companies must be more responsible while dealing with data. We also see is that a lot of startups functioning in a highly competitive environment are in an eternal race to keep customers engaged with new features and implementing new ways of approaching things. All of it is prone to new threats and they need to have firm policies to make security review a part of the process from the very beginning. For this, we advocate that it is important to have the right people and policies in place who can ensure a secure environment.
Do you believe companies today have accelerated their digital transformation initiatives?
While the world is hit by the COVID crisis there is a big shift in the way business is being conducted. Organizations are leaning more and more towards digital and on internet-facing platforms. Most traditional businesses had to rush into making quick changes to continue to do business and had to find alternative ways to stay afloat and were in a scramble to recoup revenue losses.
What is clearly evident is that most companies are now focusing on strengthening and implementing cloud technologies to accelerate their digital transformation. This is mainly to enable remote working conditions as well as to have better processes and systems which will allow them to reap major benefits.
What are the cybersecurity trends for 2021?
Extended Detection and Response (XDR) is the big one as endpoint security has become one of the biggest challenges with increased numbers of people working from home. It is not just that the number of incidents that have grown exponentially, but customers are seeing more advanced attacks and hacks aimed at devices that are connecting to the enterprise via VPN. What XDR allows is a platform to consolidate multiple products and deliver unified security and this form of endpoint security is crucial currently. It tackles a very large number of security services that focus on advanced threat detection and response.
What are the key factors to consider to make sure the digital economies of today are secured?
Two of the key areas that need to be in place to ensure strong security are responsibility and agility. Responsibility is not just about having someone in place to tackle the security needs in a digital economy, but more focused on nurturing and guiding both employees and end customers on the importance of security alertness. It is always important to assume networks are compromised and probe deeper rather than proving that the network is hacked. In today’s fast-paced world where technological advancements are happening on a daily basis, it is critical to upgrade and not hold on to legacy systems.
On the other hand, security agility includes a 360-degree approach that takes into consideration maintenance, upgrades, legacy code, feature removal, etc. It is also important to avoid being perimeter obsesses, when, at this point employees are constantly on the move and accessing company data from personal devices which are prone to attacks. Another key point to consider is that the CISO or the IT teams, in general, are made a part of the decision-making processes where security is factored from the very start and is able to benefit with adequate budgets. All this is possible when there is a cultural shift that understands the intrinsic value of technology and security.
Cyber Security
Positive Technologies Reports 80% of Middle East Cyberattacks Compromise Confidential Data

A new study by cybersecurity firm Positive Technologies has shed light on the evolving cyber threat landscape in the Middle East, revealing that a staggering 80% of successful cyberattacks in the region lead to the breach of confidential information. The research, examining the impact of digital transformation, organized cybercrime, and the underground market, highlights the increasing exposure of Middle Eastern nations to sophisticated cyber threats.
The study found that one in three successful cyberattacks were attributed to Advanced Persistent Threat (APT) groups, which predominantly target government institutions and critical infrastructure. While the rapid adoption of new IT solutions is driving efficiency, it simultaneously expands the attack surface for malicious actors.
Cybercriminals in the region heavily utilize social engineering tactics (61% of cases) and malware (51%), often employing a combination of both. Remote Access Trojans (RATs) emerged as a primary weapon in 27% of malware-based attacks, indicating a common objective of gaining long-term access to compromised systems.
The analysis revealed that credentials and trade secrets (29% each) were the most sought-after data, followed by personal information (20%). This stolen data is frequently leveraged for blackmail or sold on the dark web. Beyond data theft, 38% of attacks resulted in the disruption of core business operations, posing significant risks to critical sectors like healthcare, transportation, and government services.
APT groups are identified as the most formidable threat actors due to their substantial resources and advanced technical capabilities. In 2024, they accounted for 32% of recorded attacks, with a clear focus on government and critical infrastructure. Their activities often extend beyond traditional cybercrime, encompassing cyberespionage and even cyberwarfare aimed at undermining trust and demonstrating digital dominance.
Dark web analysis further revealed that government organizations were the most frequently mentioned targets (34%), followed by the industrial sector (20%). Hacktivist activity was also prominent, with ideologically motivated actors often sharing stolen databases freely, exacerbating the cybercrime landscape.
The United Arab Emirates, Saudi Arabia, Israel, and Qatar, all leaders in digital transformation, were the most frequently cited countries on the dark web in connection with stolen data. Experts suggest that the prevalence of advertisements for selling data from these nations underscores the challenges of securing rapidly expanding digital environments, which cybercriminals are quick to exploit.
Positive Technologies analyst Alexey Lukash said, “In the near future, we expect cyberthreats in the Middle East to grow both in scale and sophistication. As digital transformation efforts expand, so does the attack surface, creating more opportunities for hackers of all skill levels. Governments in the region need to focus on protecting critical infrastructure, financial institutions, and government systems. The consequences of successful attacks in these areas could have far-reaching implications for national security and sovereignty.”
To help organizations build stronger defenses against cyberthreats, Positive Technologies recommends implementing modern security measures. These include vulnerability management systems to automate asset management, as well as identify, prioritize, and remediate vulnerabilities. Positive Technologies also suggests using network traffic analysis tools to monitor network activity and detect cyberattacks. Another critical layer of protection involves securing applications. Such solutions are designed to identify vulnerabilities in applications, detect suspicious activity, and take immediate action to prevent attacks.
Positive Technologies emphasizes the need for a comprehensive, result-driven approach to cybersecurity. This strategy is designed to prevent attackers from disrupting critical business processes. Scalable and flexible, it can be tailored to individual organizations, entire industries, or even large-scale digital ecosystems like nations or international alliances. The goal is to deliver clear, measurable results in cybersecurity—not just to meet compliance standards or rely on isolated technical fixes.
GISEC
ManageEngine @ GISEC Global 2025: AI, Quantum Computing, and Ransomware Form Part of Cybersecurity Outlook for 2025

As AI-powered attacks and quantum computing reshape the cyber threat landscape, organizations must rethink traditional defense strategies. In an exclusive interview, Sujoy Banerjee, Associate Director at ManageEngine, reveals how businesses can prepare for 2025’s most critical threats—from AI-generated phishing scams to quantum-decrypted ransomware (more…)
GISEC
Positive Technologies @ GISEC Global 2025: Demonstrating Cutting-Edge Cyber Threats and AI Defense Strategies

At GISEC Global 2025, Positive Technologies showcased live demonstrations of sophisticated hacking techniques while emphasising the growing role of AI in both cyber attacks and defense. In an exclusive interview with Security Review, Ilya Leonov, the Regional Director at Positive Technologies revealed insights about the Middle East’s evolving threat landscape, their work with regional governments, and why investing in human expertise remains critical despite advancing technologies (more…)
-
News1 week ago
Reolink Launches Smart Security Solutions in Middle East
-
Cyber Security3 days ago
Beyond Blocklists: How Behavioural Intent Analysis Can Safeguard Middle East Businesses from Rising AI-Driven Bot Threats
-
Channel Talk1 week ago
Dynatrace Names DXC Global Partner of the Year
-
Events1 week ago
Matrix to Exhibit NDAA Compliant Surveillance at ESX North America 2025
-
Cyber Security3 days ago
Honeywell Report Reveals 46% Quarterly Spike in Industrial Ransomware
-
Cyber Security4 days ago
Labubu Doll Craze: How Cybercriminals Are Exploiting the Hype
-
News1 week ago
BlueCat to Show Off Next-Gen Network Operations at Cisco Live
-
Cyber Security3 days ago
Sophos Boosts Firewall with New Protection and Incident Response Features