logo
PowerDMARC to exhibit at GISEC 2025 in Dubai

PowerDMARC to exhibit at GISEC 2025 in Dubai

Zawya02-05-2025

PowerDMARC, a global leader in email authentication and DMARC management solutions, is thrilled to announce its participation in GISEC 2025 from May 6–8 at the Dubai World Trade Centre, UAE.
You can find PowerDMARC at booth SP107, where their team will be showcasing how they are transforming email security for organizations across the Middle East and Africa. PowerDMARC will demonstrate its advanced solutions for protecting domains against phishing, spoofing, and impersonation attacks, empowering managed security service providers (MSSPs) and enterprises to enhance their cybersecurity posture.
GISEC 2025 brings together over 25,000 information security professionals, global industry leaders, government officials, and technology innovators from more than 160 countries. PowerDMARC joins this dynamic ecosystem to highlight the critical role of DMARC, SPF, DKIM, BIMI, MTA-STS, and TLS-RPT in improving email deliverability, strengthening domain security, and building digital trust for organizations of all sizes.
'Our mission is to equip organizations and partners across the Middle East and Africa with robust, user-friendly email authentication solutions that address today's most pressing cyber threats,' said Zainab Al Lawati, Business Development Manager (MEA) at PowerDMARC. 'GISEC provides an exceptional platform to engage with cybersecurity leaders, share knowledge, and work together toward a more secure digital future.'
Schedule a meeting in advance with the PowerDMARC team, or visit https://powerdmarc.com for more information.
About PowerDMARC
PowerDMARC is a domain security and email authentication SaaS platform that helps organizations protect their domain names, brands, and emails against spoofing, impersonation, ransomware, and other forms of unauthorized use. PowerDMARC provides a complete suite of hosted email security protocols, including DMARC, SPF, DKIM, BIMI, MTA-STS, and TLS-RPT, along with simplified reporting and AI-powered threat intelligence. Supporting over 10,000 organizations in more than 100 countries, PowerDMARC is trusted by Fortune 100 companies, governments, and MSSPs worldwide.
The PowerDMARC platform is MSP/MSSP-ready, offering multi-tenancy, whitelabel capabilities, and compliance with SOC2 Type 2, ISO 27001, and GDPR standards.
Media Contact
Zainab Al Lawati
Business Development Manager (MEA) at PowerDMARC
zainab.allawati@powerdmarc.com

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

iZOOlogic unveils new Cyber Threat Intelligence suite at GISEC 2025 in Dubai
iZOOlogic unveils new Cyber Threat Intelligence suite at GISEC 2025 in Dubai

Khaleej Times

time27-05-2025

  • Khaleej Times

iZOOlogic unveils new Cyber Threat Intelligence suite at GISEC 2025 in Dubai

iZOOlogic, a leading global cybersecurity firm, has announced the launch of its enhanced Cyber Threat Intelligence product suite at GISEC Global 2025, the Middle East's premier cybersecurity event held at the Dubai World Trade Centre. The launch marks a significant expansion of iZOOlogic's capabilities in threat intelligence, tailored to the evolving needs of critical sectors in the GCC region. The newly launched threat intelligence suite includes four key modules: ● IOC (Indicators of Compromise) Feed ● Cyber Intelligence Advisory ● Vulnerability Management ● Malware Intelligence Data Feed These offerings empower organisations to anticipate, detect, and neutralise cyber threats in real-time while staying compliant with regional and global security standards. iZOOlogic has rapidly expanded its footprint across the UAE, now serving over 45 enterprise clients, including the country's largest bank and its leading airline. The company also boasts a growing portfolio across the broader GCC region, with strategic clients in Saudi Arabia (KSA), Qatar, Kuwait, and Bahrain. At GISEC 2025, iZOOlogic showcased how its proprietary technologies are helping financial institutions, airlines, telecoms, and government entities mitigate risk and maintain operational resilience in the face of increasingly complex cyber threats. The exhibit drew significant attention from CISOs, regulators, and regional partners keen to enhance their threat visibility and incident response posture. The iZOOlogic business leadership team traveled from London to Dubai to meet with key customers, and explore new partnerships. 'This has been an incredible opportunity to connect face-to-face with our UAE and GCC clients, many of whom rely on iZOOlogic to protect their most sensitive digital assets,' said the team in a joint statement. 'We're proud to play a trusted role in strengthening the region's cyber defenses.' The launch of the enhanced Cyber Threat Intelligence suite underscores iZOOlogic's ongoing commitment to innovation, intelligence-led defense, and strong regional partnerships.

BeamSec launches MailX at GISEC 2025
BeamSec launches MailX at GISEC 2025

Tahawul Tech

time20-05-2025

  • Tahawul Tech

BeamSec launches MailX at GISEC 2025

In an era where cyber threats are growing more sophisticated by the day, organisations are rethinking how they protect one of their most critical assets: the inbox. Email remains the most common entry point for cyberattacks, particularly phishing, which continues to evolve in both volume and complexity. At GISEC 2025, BeamSec made a decisive move to address this challenge by officially launching MailX, its advanced Email Monitoring & Behavioural Analysis tool. MailX is designed to deliver intelligent, real-time protection by continuously monitoring email activity. Unlike traditional filters that rely heavily on static threat databases, MailX learns from how each organisation communicates. It detects subtle anomalies in tone, structure, or sender behaviour—often before a user even realises something is off. A slightly misspelled domain, a file that 'looks normal' but isn't, or an unexpected shift in message patterns: MailX identifies these signals and takes action immediately. It quarantines threats, alerts security teams, and minimises response time to potential incidents. What makes MailX stand out is not just its detection capabilities, but its adaptive intelligence. The system evolves with the organisation, learning its unique communication habits and adjusting accordingly. This behaviour-based approach allows MailX to go beyond surface-level scanning, offering proactive defence tailored to each environment. For teams tasked with safeguarding sensitive communications, it represents a significant upgrade over legacy solutions. While MailX operates in the background with quiet precision, BeamSec understands that true cybersecurity requires both machine intelligence and human awareness. That's where Alfred, the company's conversational AI assistant, comes in. Already actively used across the UAE, Alfred brings a new dimension to security awareness by turning passive training into real-time engagement. Instead of annual sessions or static e-learning modules, Alfred delivers personalised, bite-sized guidance exactly when it's needed—right within the user's workflow. Employees can report suspicious emails with a single click, submit questionable links or attachments for immediate review, and receive instant feedback that reinforces secure behaviour. Alfred adapts to each user's habits and needs, making learning feel natural rather than forced. Over time, this results in more confident, cyber-aware teams that actively participate in their own protection. Together, MailX and Alfred form a complementary defence system: one focused on intelligent threat detection, the other on building strong human behaviour. By combining these two layers, BeamSec offers a forward-thinking security framework designed for today's hybrid, fast-paced work environments. As cyber risks continue to rise, BeamSec's AI-first approach represents more than just innovation—it's a necessary evolution in how organisations prepare, respond, and stay ahead. Image Credit: BeamSec

CrowdStrike highlights AI innovations shaping cyber defence at GISEC 2025
CrowdStrike highlights AI innovations shaping cyber defence at GISEC 2025

Tahawul Tech

time20-05-2025

  • Tahawul Tech

CrowdStrike highlights AI innovations shaping cyber defence at GISEC 2025

Yassin Watlal, Head of System Engineering and Solutions Architect META at CrowdStrike, shares key takeaways from GISEC 2025, shedding light on AI-driven cyber threats and defense innovations. Dubai— During GISEC Global 2025, discussions centered on Artificial Intelligence (AI) and its transformative impact on cyber threats. Yassin Watlal, Head of System Engineering and Solutions Architect META at CrowdStrike, offered insights to into the growing sophistication of cyber attackers using AI. Watlal explored the evolving strategies to counter these advanced threats, from AI-enhanced phishing attacks to insider threats like Famous Chollima. Watlal shared valuable perspectives on how businesses could secure their systems and adapt to rapid technological innovations, addressing the evolving cybercrime landscape, AI's role in defense, and practical security measures to mitigate risks. Interview Excerpts:How was GISEC this year compared to last year, would you like to share some insights?GISEC Global 2025 fostered significant engagement and insightful discussions this year, particularly focusing on the profound ways in which Artificial Intelligence (AI) is reshaping the landscape of cyber threats. Attendees actively participated in exploring the evolving tactics of threat actors leveraging AI, as well as the defensive strategies and innovative solutions being developed to counter these sophisticated attacks. The conversations delved into the implications of AI for various aspects of cybersecurity, including threat detection, incident response, vulnerability management, and security automation. The level of engagement underscored the collective interest and concern within the cybersecurity community regarding the transformative impact of AI. What are the key findings from the 2025 GTR that you would like to share with us? Current threat actors possess significant funding and meticulously planned objectives in their campaigns. A notable emphasis on identity threats has been observed, evidenced by a 50% increase in dark web advertisements offering compromised credentials. This has led to expedited attacks, with an average breakout time of 48 minutes, defined as the time for initial machine infection and lateral movement. The fastest recorded breakout time was 51 seconds. What is the role of Gen AI in modern cybercrime? AI is utilised by cyber attackers to enhance their attacks, integrating it as a novel component within their global arsenal. Generative AI is primarily employed to refine emails prior to launching phishing campaigns, thereby improving their authenticity and appeal to recipients. Consequently, a significant increase in click-through rates has been observed, with AI-generated emails achieving a 54% click-through rate compared to a 14% rate for human-authored emails. This technology also reduces the skill threshold required for less sophisticated threat actors to engage in malicious activities. Can you tell us more about the insider threats like Famous Chollima? And what are some of the mitigation strategies companies can adopt? The threat actor group Famous Chollima, based in North Korea, employs artificial intelligence to generate fraudulent applications, LinkedIn profiles, and candidate personas, meticulously crafting them to appear highly credible and attractive to recruiters and human resource personnel, aiming to secure employment. Furthermore, during the interview process, they utilize generative AI to formulate responses to questions, enabling them to successfully pass interviews. 'Instances have been reported wherein individuals associated with this group were hired, received company-issued laptops through intermediaries, and performed assigned tasks, effectively gaining insider access.' Can you tell us more about the companies that can secure cloud and hybrid environments? AI-native platform, such as the CrowdStrike Falcon platform, is crucial for effective cybersecurity. Integrating AI natively allows for the realization of its full benefits, particularly in enabling responses at machine speed. Given that attacks materialize rapidly, it is imperative to respond with equal speed. This ensures the ability to maintain a comprehensive understanding of the situation and effectively address threats in a timely manner. What did CrowdStrike exhibit at this year at GISEC? We showcased our latest innovations, our Falcon platform, discussed Charlotte AI, our generative AI offering, and highlighted products that enhance the ecosystem. What are the new technologies that will be integrated by CrowdStrike in the field of cybersecurity? Artificial intelligence is progressively being integrated into various solutions, exemplified by the detection triage facilitated by Charlotte AI and the comprehensive agentic API, which significantly enhances efficiency for cybersecurity analysts. This implementation results in substantial time savings, approximately 40 hours per week for the team, by enabling the agentic AI to effectively differentiate between true positives and false positives, thus expediting response times and optimizing the deployment of AI in the defense strategy. How is cybersecurity being integrated with this rapid technological innovation, and what security measures should businesses adopt in response? Our focus is on ensuring resilience and maintaining a proactive stance against threats. We aim to alleviate routine operational burdens, thereby mitigating risks for our clients. All our efforts are directed towards preventing breaches and safeguarding customer interests by streamlining operational processes traditionally associated with legacy systems. We believe Agentic AI should be deployed to handle these tasks. Could you provide tips for best security practices? We have observed attacks such as LLM jacking. When deploying AI, it is imperative to secure it throughout the deployment process, rather than deploying without security considerations. It is necessary to ensure the security of these new application layers. Regarding LLM jacking, if threat actors obtain cloud credentials, they can log in and execute queries within a subscribed LLM. This can result in increased costs and potential data exposure. Data could be compromised, and private knowledge could be extracted through techniques such as prompt injection. Securing AI and this new application layer is of significant importance. Crowdstrike can provide assistance in this regard.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store