Cyber Security
Ensuring Comprehensive Visibility Across All Teams is Key
Bilal Baig, Regional Director, Technical, MMEA at Trend Micro, says companies should have a robust incident response plan in place
How is the threat landscape evolving? Are there any emerging threats we should be particularly concerned about?
The threat landscape is constantly evolving, and there are two key aspects to consider. Firstly, traditional cybersecurity threats, such as ransomware and phishing, remain a significant concern. While established security measures are in place to combat these well-known threats, they continue to evolve and adapt, posing an ongoing challenge.
Secondly, the introduction of advanced technologies, like Artificial Intelligence (AI), has led threat actors to leverage these capabilities to enhance their attack tactics, making them more sophisticated. As attacks become more complex, defenders are also employing AI-based defence mechanisms to counteract these advanced threats. This creates a continuous cycle of escalation, where both attackers and defenders leverage new technologies to outpace each other. Hence, the biggest current threat, both regionally and globally, is the extensive use of AI by cybercriminals.
This trend is not limited to phishing but extends across all types of cyber threats, making them more evasive and difficult to detect. From our side, Trend Micro is actively integrating advanced technologies, including AI, to ensure that these sophisticated attacks can be effectively thwarted.
What does “cybersecurity resilience” mean to you?
For us, the key to cybersecurity resilience is to stay one step ahead by conducting predictive analysis of potential security threats and attacks. This involves assessing the risk factors across various environments, whether it’s your mobile device, laptop, servers, or any system using AI. By analysing the risk matrix, we can forecast the likelihood of attacks and take proactive countermeasures. This anticipatory approach embodies cyber resilience, ensuring we can effectively respond to emerging attack surfaces as they arise.
How can organisations balance the need for security with operational efficiency?
A different approach is certainly required. The main global trend we observe, including in the UAE, is consolidation. The market is experiencing numerous mergers and acquisitions, leading to the consolidation of security tools. This means integrating security measures across endpoints, mobile devices, clouds, and other areas.
Previously, each of these security aspects operated in silos, but the focus has now shifted to breaking down these silos and consolidating security tools. This consolidation allows for a more comprehensive and unified view of security, enabling the creation of a real attack matrix and making it easier to identify threats, much like finding a needle in a haystack. This integrated approach is undoubtedly the way forward for organizations seeking to balance security and operational efficiency.
What are some best practices for incident response planning and recovery?
Most organizations focus on proactive measures to address potential threats. When we step in, we emphasize the importance of having a comprehensive incident response plan. This is crucial because a well-planned approach is far more effective than a reactive one where everyone is scrambling in different directions.
Our goal is to ensure clients have a robust incident response plan in place. If a breach occurs, this plan provides a clear, step-by-step process to follow. This includes isolating affected machines, responding to the threat, and containing the situation. This approach not only addresses the technical aspects but also helps manage the organization’s reputation. Therefore, we are committed to supporting our clients in both preventing breaches and effectively managing them if they do occur.
What role do emerging technologies like AI and machine learning play in both cyber threats and defences?
With the advent of emerging technologies like AI, phishing emails have become remarkably sophisticated. The grammar is perfect, and the links are well-defined, making these emails appear completely legitimate. Attackers can even translate these emails into multiple languages, such as Arabic or French, making them more convincing and far-reaching. From the attacker’s perspective, AI provides powerful tools to craft these deceptive messages.
They can use social media data and advanced AI to tailor phishing attempts precisely, increasing their chances of success. On the defender’s side, advanced AI modules are also being deployed. Just like a fingerprint, everyone has a unique writing style, which includes sentence structure, tone, and emotion. AI helps analyze these elements to identify potential threats.
For instance, AI can detect if an email was generated by another AI tool by examining writing style DNA and other nuanced features. Thus, while attackers are leveraging AI to enhance their tactics, defenders are equally using AI to bolster their defences. It’s a continuous battle where both sides are utilizing advanced tools.
What are some of the biggest challenges organizations face when implementing cybersecurity resilience strategies?
The biggest challenge within organizations is the existence of multiple silos. Application teams, cloud teams, network teams, and endpoint teams all operate independently, each focusing only on their specific areas. This lack of integration and visibility can hinder effective decision-making and security management.
Consolidation and breaking down these silos are crucial. Companies are now looking to merge their strategies to ensure comprehensive visibility across all teams. This holistic approach allows for better decision-making not just in cybersecurity but also in related areas such as legal, finance, and procurement.
When procuring a cybersecurity solution, it’s essential to consider how it will support all these departments. For instance, a robust cybersecurity solution should aid the legal team in compliance, assist the finance team in budgeting and cost management, and help the procurement team in selecting the best tools and services. This integrated strategy ensures that all parts of the organization are aligned and can respond effectively to security threats.
Cyber Security
AmiViz Champions Cybersecurity Innovation at Leading MENA Events
AmiViz has announced its successful participation in two key regional cybersecurity conferences: MENA ISC 2024 in Saudi Arabia, and CYSEC UAE 2024 in the UAE. These events have served as a platform for AmiViz to collaborate with its top vendors, including Bitsight, Cequence Security, Picus Security, AlgoSec, BlackBerry, Check Point, Tenable, Asimily, and Threatcop, to showcase cutting-edge cybersecurity technologies and solutions.
Throughout these events, AmiViz engaged deeply with partners and customers, gaining invaluable insights into the unique cybersecurity challenges faced in the region. The focus was on promoting new technologies that address these challenges and enhance security protocols for businesses operating in the dynamic Middle Eastern market.
“Our presence at the MENA ISC 2024, and CYSEC UAE 2024 has been a remarkable opportunity for us to not only present our innovative solutions but also to understand firsthand the needs and pain points of our clients,” stated Ilyas Mohammed, COO at AmiViz. “Collaboration with our key vendors has allowed us to offer a comprehensive suite of cybersecurity products and services that cater specifically to the complexities of this region.”
AmiViz’s participation in these events underscores its commitment to advancing cybersecurity readiness and resilience across the Middle East. By leveraging strategic partnerships with leading global vendors, AmiViz continues to bring state-of-the-art cybersecurity solutions to the forefront, helping businesses protect their critical assets against increasingly sophisticated cyber threats.
AmiViz, along with its key vendors, will continue participating in major tech events, with plans for a strong presence at GITEX next month. Following GITEX, the company is gearing up for Black Hat in Saudi Arabia this November, showcasing its cutting-edge cybersecurity solutions to the region.
Cyber Security
UAE and Saudi Arabia Face Unprecedented 70% Rise in Threats: Positive Technologies
Positive Technologies experts have unveiled comprehensive research on the shadow market of cybercriminal services targeting the Gulf countries. The UAE and Saudi Arabian organizations remain in the crosshairs of cybercriminals, and over half of all posts on darknet forums are about selling data and access to local companies’ infrastructures. Researchers have highlighted a sharp increase in the free distribution of such data on the dark web, along with a surge in reports of DDoS attacks targeting the public sector and other industries. One in five ads analyzed was related to buying or selling access, with two-thirds available for under $1,000.
According to the research, cybercriminals remain focused on the two largest economies in the region—the UAE (40% of all posts) and Saudi Arabia (26%). The spotlight on darknet forums is on the public sector, which accounted for 21% of all analyzed posts. Most of the data (63%) related to regional government institutions was published for free as part of hacktivist attacks. Next in line for most popular on the dark web are commerce (16% of all ads), the service sector (15%), and financial institutions (13%).
Amid geopolitical tensions, hacker groups have ramped up calls for DDoS attacks and breaches to disrupt government institutions in the region. In the first half of 2024, the number of reports on the results of DDoS attacks on the dark web surged by 70% compared to the same period in 2023. Beyond the public sector, hacktivists also targeted the financial and transportation sectors.
According to the research, 33% of all the analyzed ads were linked to data breaches. One-third of these messages were about selling information. In these ads, criminals primarily offered databases stolen from major commerce companies, with an average cost of $2,300.
Positive Technologies analyst Anastasiya Chursina commented, “When compared to our previous research over a similar period, the share of freely distributed data almost doubled (up to 59%). This allows criminals to broaden the profiles of potential victims for targeted attacks. If the victim refuses to pay the ransom, both ransomware groups, as well as hacktivists (whose goal is to draw public attention to a political stance rather than just receive financial gain), can distribute data for free.”
Accessing company information resources is the second most common type of dark web ads, making up 21% of all listings. According to the research, in 70% of all cases, access can be bought for less than $1,000. The vast amount of access-for-sale ads on the darknet and their low cost make it easier for cybercriminals to gain initial access and launch attacks on organizations in the region.
Positive Technologies recommends that companies build their defences based on result-driven cybersecurity, using modern tools such as application-level firewalls, including cloud versions, network traffic analysis systems, solutions for monitoring information security events and managing incidents, as well as metaproducts.
Cyber Security
BotGuard OÜ to Offer Live Demos at GITEX GLOBAL 2024
BotGuard OÜ will present its intuitive, user-friendly cybersecurity solution at GITEX GLOBAL 2024, focusing on effective bot protection. Live demonstrations in Hall 25 stand H25-21 will showcase the ease and efficiency of the technology in securing websites against malicious attacks. “Our participation in GITEX GLOBAL 2024 underscores our commitment to addressing the escalating malicious bot attacks faced by organizations worldwide,” said Bertil Brendeke, Chief Revenue Officer (CRO) of BotGuard OÜ. “At GITEX, we aim to engage with industry leaders and stakeholders, sharing our expertise and practical technologies that can help fortify their defences.”
In 2023, 17% of API attacks involved bad bots exploiting business logic vulnerabilities. For hosting companies, such vulnerabilities can lead to unauthorised access to sensitive customer data or control over hosting resources, further emphasizing the need for reliable security protocols and regular audits of their systems. “BotGuard OÜ’s solutions are designed to address these exact challenges, enabling businesses to safeguard their digital assets. The technology is incredibly easy to use, making it accessible for businesses of all sizes,” the company said.
By participating in GITEX GLOBAL 2024, BotGuard OÜ aims to expand its reach in the Middle East, providing local businesses with the tools they need to combat cyber threats effectively. During the event, live demonstrations in Hall 25 stand H25-21 will showcase how their website protection can be set up within a minute. These demonstrations will highlight the efficiency and effectiveness of BotGuard’s solutions.
-
Cyber Security1 week ago
Global Cybersecurity Efforts Gain Momentum, But More Action Needed
-
Cyber Security1 week ago
Proofpoint Sets New Standard for Human-Centric Security
-
Homeland Security1 week ago
Homeland Security Market is Expected to Surpass $900 Bn By 2032
-
Homeland Security1 week ago
Lockheed Martin Delivers C-130J Super Hercules to Egypt
-
Events1 week ago
GITEX Digi_Health 5.0 Expo-Summit Asia Launches in Thailand
-
Cyber Security2 days ago
UAE and Saudi Arabia Face Unprecedented 70% Rise in Threats: Positive Technologies
-
Cyber Security2 days ago
BotGuard OÜ to Offer Live Demos at GITEX GLOBAL 2024
-
Cyber Security14 hours ago
AmiViz Champions Cybersecurity Innovation at Leading MENA Events