
How AI is reinventing cybersecurity for the Automotive Industry
Autonomous and electric vehicle uptake is rising across the Middle East, driven by national agendas and a growing push for sustainable mobility. With this rapid growth however comes an urgent need to address cybersecurity at every stage of the automotive value chain.
Artificial Intelligence (AI) is at the heart of this shift; transforming not only how vehicles operate, but also how cyber threats are identified, mitigated, and prevented. From predictive maintenance to driver behaviour analytics, AI is streamlining processes and unlocking efficiencies. But it is also redefining the security perimeter for automotive organisations.
Forces Influencing AI Adoption in Automotive
As the industry evolves, three forces are shaping the current landscape: stricter regulations, rapid AI integration, and a fundamental change in communication infrastructure. Regulations such as the Cyber Resilience Act and NIS2 for example are introducing more granular compliance mandates, especially for sectors handling critical infrastructure.
Meanwhile, AI is accelerating business and individual learning processes. At the network level, the need for faster communication and bandwidth adaptability is giving rise to next-generation connectivity frameworks that can support AI-native systems.
This evolution in infrastructure and intelligence also promotes a significant shift in cybersecurity from reactive to preventive. AI is increasingly being used to analyse threat landscapes and internal vulnerabilities in real-time. This shift enables organisations to prepare for attacks before they happen, leveraging behavioural analytics and high-speed correlation to stay ahead of potential breaches. Hardware acceleration and software development, guided by AI, are now setting the pace for how cybersecurity evolves across the industry.
The Impact of Cybersecurity
Unsurprisingly, automotive enterprises are becoming high-value targets for cybercriminals. Three core factors contribute to this trend; the financial opportunity of holding connected services hostage, the complexity of digital supply chains, and the vast amount of sensitive data being generated.
With every vehicle connected to cloud-based services, a single breach can have wide-ranging brand, operational, and financial repercussions. Moreover, the ecosystem of third-party vendors involved in producing autonomous and electric vehicles significantly expands the attack surface.
The use of digital twins and advanced manufacturing technologies further intensifies the volume of valuable data. This information ranging from user behaviour patterns to proprietary designs is not only attractive to attackers but also becomes a tool for launching future attacks or selling on the dark web.
AI Transformations in the Automotive Supply Chain
AI is also transforming the automotive supply chain. Predictive maintenance for example – as opposed to scheduled or reactive vehicle maintenance, which until now has been the norm – enables companies to forecast part failures, optimise distribution, and reduce warehousing costs. AI can analyse and synthesise so many data streams that this guessing game becomes much more accurate. Not only does this mean more reliable vehicles for the consumer, but it also means that each element of demand can be optimised.
Driver behaviour analysis and in-cabin monitoring systems powered by AI are also enhancing safety, particularly for long-haul truck drivers exposed to risks such as fatigue and theft. These AI-powered innovations are already helping companies reduce operational costs while improving customer satisfaction.
Strengthening security across the supply chain means embedding real-time monitoring, mapping data flows, and building a fast, coordinated response to incidents. The introduction of cyber resilience principles encouraged by regulatory bodies requires organisations to maintain robust and sustainable response mechanisms. AI can help with this.
AI's Role in Automotive Cybersecurity
The future of AI in automotive cybersecurity lies in its ecosystem-wide integration. Multimodal AI models that can process text, images, and design data are already in use.
But the next phase involves combining internal and external intelligence to strengthen risk postures. Synthetic data created specifically to train internal models without exposing real user data is becoming an important asset in speeding up AI development while preserving privacy.
The impact of AI can be summarised as transformative, dual-edged, and adaptable. It is enhancing cybersecurity readiness, being weaponised by attackers, and empowering businesses to evolve quickly in a changing environment.
As the Middle East embraces connected mobility and smart transportation, the conversation must move beyond adopting AI to implementing it securely and intelligently. The road to the future may be autonomous, but its success will hinge on cybersecurity built for adaptability, speed, and scale.
Image Credit: Fortinet

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Channel Post MEA
3 days ago
- Channel Post MEA
Fortinet Announces Expansion Of FortiCloud
Fortinet has announced a major expansion of FortiCloud, its global cloud infrastructure. The latest release introduces FortiIdentity, designed for cloud-delivered identity management for hybrid teams, and two new beta services, FortiDrive and FortiConnect, to provide enterprise-grade secure storage and protected communications. Each service is tightly integrated into the Fortinet Security Fabric, giving organizations security-native alternatives to point products often dependent on bolt-on security. 'FortiIdentity, FortiDrive, and FortiConnect, are key milestones in our vision to build a unified global cloud network that brings enterprise-grade security directly into the way teams manage access, store, share, and communicate. These new services extend the power of the Fortinet Security Fabric into everyday productivity and access control, reinforcing our strategy to simplify security operations, reduce vendor sprawl, and empower hybrid work at scale,' says Michael Xie, Founder, President, and Chief Technology Officer at Fortinet. Integrated Innovation Backed by Global Infrastructure This announcement builds on Fortinet's continued investment in its global hybrid-cloud infrastructure, including company-owned data centers in Atlanta, Chicago, New York, Plano, Frankfurt, Sydney, and Torija (Spain). These facilities are strategically designed to deliver low-latency services and support regional demand, combining compute, storage and recovery, and security capabilities. Fortinet also addresses growing data sovereignty requirements by enabling organizations to keep data local through its globally distributed infrastructure. Complementing these investments, Fortinet leverages over 160 points of presence (POPs) through providers like Google Cloud, AWS, and Digital Realty to ensure secure, high-performance delivery of edge services. Fortinet also delivers a broad range of services made available across cloud marketplaces that include AWS, Azure, and Google Cloud, enabling organizations to benefit from greater service resiliency, geographic flexibility, and seamless access to Fortinet's cloud-delivered security offerings wherever they operate. FortiCloud: Security-Native Services for the Modern Enterprise With this expansion, Fortinet furthers its strategy of delivering a unified platform that enables organizations to consolidate tools, enhance security posture, and reduce total cost of ownership. The growing FortiCloud service portfolio now includes three new security-native services designed for today's hybrid workforce: FortiIdentity : A long-established Fortinet identity and access management (IAM) solution, now delivered from FortiCloud, offers enterprises a full-featured, cloud-native approach to secure identity management. It provides secure single sign-on (SSO), multifactor authentication (MFA), FIDO2 passkeys, and identity federation across Fortinet and third-party applications without the need for additional hardware or software. With support for FortiToken Mobile, FIDO2 passkeys, and SAML/OIDC standards, FortiIdentity simplifies identity administration and scales easily to meet enterprise and MSSP requirements. The addition of FortiPAM-as-a-Service as a module of FortiIdentity provides continuous zero-trust network access (ZTNA) checks needed to protect privileged access to the IT environment. : A long-established Fortinet identity and access management (IAM) solution, now delivered from FortiCloud, offers enterprises a full-featured, cloud-native approach to secure identity management. It provides secure single sign-on (SSO), multifactor authentication (MFA), FIDO2 passkeys, and identity federation across Fortinet and third-party applications without the need for additional hardware or software. With support for FortiToken Mobile, FIDO2 passkeys, and SAML/OIDC standards, FortiIdentity simplifies identity administration and scales easily to meet enterprise and MSSP requirements. The addition of FortiPAM-as-a-Service as a module of FortiIdentity provides continuous zero-trust network access (ZTNA) checks needed to protect privileged access to the IT environment. FortiDrive : A secure file storage and collaboration solution that protects sensitive data at rest and in transit. Featuring advanced encryption and granular access controls, FortiDrive enables teams to store and manage content safely. Real-time collaboration capabilities allow users to co-edit and share files and folders with colleagues or partners. Built-in version history ensures changes are tracked and can be easily rolled back if needed. FortiDrive also includes site management functionality to help organize content by team or project, along with policy-based compliance enforcement through role-based access control and least-privilege principles. : A secure file storage and collaboration solution that protects sensitive data at rest and in transit. Featuring advanced encryption and granular access controls, FortiDrive enables teams to store and manage content safely. Real-time collaboration capabilities allow users to co-edit and share files and folders with colleagues or partners. Built-in version history ensures changes are tracked and can be easily rolled back if needed. FortiDrive also includes site management functionality to help organize content by team or project, along with policy-based compliance enforcement through role-based access control and least-privilege principles. FortiConnect: A unified communication platform that integrates seamlessly with FortiDrive, enabling secure calling, messaging, meetings, and file sharing from anywhere. It delivers an intuitive collaboration experience underpinned by FortiGuard Labs AI-powered threat intelligence, ensuring communications are protected against evolving cyberthreats. All three services are natively integrated into the Fortinet Security Fabric, providing centralized visibility, consistent policy enforcement, and real-time threat protection across users, devices, applications, data, and AI agents. Continued Global Investment Fortinet's ongoing investment in global cloud infrastructure empowers its platform strategy and commitment to delivering security with the best application experience possible, wherever customers operate. In addition to new POPs, Fortinet's hybrid-cloud model allows customers to access an expanding range of services, including FortiSASE, FortiAppSec, FortiCNAPP, FortiSOC, FortiMail, and FortiAIOps, through the FortiCloud centralized portal. Delivering Unified, Scalable Security through the FortiCloud Platform These new services delivered via FortiCloud reflect Fortinet's commitment to simplifying and securing hybrid operations with a unified, cloud-native platform. With a unified platform approach, centralized policy enforcement, and AI-powered threat intelligence, FortiCloud empowers organizations to optimize costs while reducing operational complexity, improve visibility, and protect data and users across distributed environments. Whether securing access, applications, or infrastructure, Fortinet continues to drive security transformation by making cloud security more simple, cost-effective, and natively integrated into the enterprise.


Channel Post MEA
04-08-2025
- Channel Post MEA
Fortinet Introduces Quantum-Safe Security Features In FortiOS
Fortinet has announced expanded innovations within its unified operating system, FortiOS, that protect against quantum-computing threats to current encryption standards. The latest FortiOS capabilities help organizations with highly sensitive data deploy encryption algorithms and key distribution methods that can withstand quantum-powered attacks, stack algorithms for more robust protection, and easily transition to post-quantum security. 'At Fortinet, we're committed to arming customers with cutting-edge technology to protect against new and emerging threats. As quantum computing advances, organizations can trust Fortinet's technology innovation and leadership to safeguard their critical data and future-proof their infrastructures. Many enterprises are eager to take action to protect their networks from quantum-powered threats. That's why we've made cutting-edge, quantum-safe features available today for FortiGate NGFW and Fortinet Secure SD-WAN customers, so they can confidently transition to post-quantum security,' said Michael Xie, Founder, President, and Chief Technology Officer at Fortinet. Organizations Handling Sensitive Information Need Quantum-Safe Encryption Now Quantum computers can perform complex calculations at unprecedented speeds and can easily break current encryption standards. Cybercriminals are already storing encrypted traffic to decrypt in the future, with a particular focus on industries that handle highly sensitive data that remains relevant over long periods, such as telecommunications, financial services, government, and healthcare. FortiOS: ready for the post-quantum world With FortiOS 7.6, organizations, such as those using FortiGate next-generation firewall (NGFW) and Fortinet Secure SD-WAN, can now leverage built-in quantum-safe features designed to defend against emerging threats, including harvest-now, decrypt-later (HNDL) attacks. These capabilities help secure network traffic, simplify deployment, and support a smooth transition to post-quantum security. Customers have access to the following quantum-safe features at no additional cost: Post-quantum cryptography (PQC) methods, including National Institute of Standards and Technology (NIST)-approved algorithms like ML-KEM and emerging algorithms like BIKE, HQC, and Frodo. Quantum key distribution (QKD), leveraging quantum mechanics to enable the secure exchange of encryption keys, ensures that any eavesdropping attempts are detectable. Fortinet introduced support for QKD integrations starting with FortiOS 7.4, enabling interoperability with leading QKD vendors via standardized interfaces. This capability underscores Fortinet's proactive approach to quantum-resilient network security by integrating quantum-safe key exchange mechanisms into its NGFW architecture. Algorithm stacking, which combines multiple cryptographic algorithms to create a more resilient solution and enhance network infrastructure security. A hybrid mode for gradual transition to post-quantum security that enables seamless integration of traditional public-key cryptography and QKD. An enhanced user interface that simplifies the configuration and management of quantum-safe settings so that network administrators can implement quantum-safe security easily. Proven Innovation You Can Trust Fortinet was founded on the principle of converging networking and security through a single operating system. This unique approach enables Fortinet to deploy cutting-edge updates, such as quantum-safe innovations, across its unified operating system, helping customers future-proof their security postures.


TECHx
01-08-2025
- TECHx
Startups Can't Afford to Ignore Cybersecurity: Interview
Home » Startups » Startups Can't Afford to Ignore Cybersecurity: Interview Fresh off an award win at GISEC North Star 2025, TECHx Media spoke with Vivek Chandran, CEO of RISKNOX Private Limited, for an interview featured in the recent June–July 2025 edition of CodeRED. In this conversation, he explains why cybersecurity has become a survival issue for startups. Size and speed no longer guarantee success. As cyberattacks grow more sophisticated, even early-stage startups are in the crosshairs. Once dismissed as too small to target, they now face the same threats as global enterprises. To understand what's at stake and what emerging businesses should do, Vivek brings a grounded, tactical view of the evolving threat landscape and how startup leaders can survive and thrive in 2025 and beyond. What are the top cybersecurity threats that startups should be most concerned about in 2025 and the coming years? The cybersecurity threat landscape isn't what it was even five years ago, it's evolving constantly. That's the first thing startups need to understand: it's not a static problem. The tools and tactics used by cybercriminals change every few months, if not weeks. If I had to pick the top three threats right now, AI-enabled cyberattacks would top the list. We're seeing a rise in sophisticated attacks powered by artificial intelligence, from deepfake phishing to automated vulnerability scanning and exploitation. These are faster, more adaptive, and harder to detect than traditional threats. Second, and this may surprise some, is human negligence. It's not a 'threat' in the classic sense, but it's often the root cause of security breaches. You can spend millions on tech, but one employee clicking the wrong link can still bring the system down. Humans remain the weakest link. And third, phishing is still a huge problem. It's old-school, but highly effective. Startups are particularly vulnerable because they often lack the infrastructure to detect and respond to social engineering attacks quickly. Phishing doesn't need to be advanced to be dangerous, it just needs to be convincing. How has the cybersecurity landscape changed over the past five years? What trends should startups keep an eye on? The past five years have been transformational. The biggest disruptor has been AI and, again, it's a double-edged sword. AI is helping us build smarter, more efficient cybersecurity tools that automate detection and response. But on the flip side, attackers are using the same AI to supercharge their campaigns. Another major shift is that every new technology introduces new vulnerabilities. AI, blockchain, IoT they all come with their own security challenges. And often, organizations adopt these technologies faster than they can secure them. Finally, governmental and regulatory forces are playing a bigger role. From GDPR to CCPA and now the Cyber Resilience Act, we're seeing a global trend toward mandatory cybersecurity compliance. This is actually a good thing it forces businesses to maintain at least a minimum viable security posture. Should cybersecurity be a legal responsibility for startups, or is that too ambitious at an early stage? In an ideal world, yes, cybersecurity would be a legal responsibility for every business, regardless of size. But in the real world, especially for startups, it's complicated. Startups often don't have the budget or the team to build a full-fledged cybersecurity framework. As a founder myself, I know how tough it is, cybersecurity can feel like a luxury when you're trying to stay afloat. But that doesn't mean startups are off the hook. What I believe and advocate is a shared responsibility model. Cybersecurity shouldn't be one person's job. Everyone, from founders to interns, should be aware of the basic principles of digital safety. Startups may not be able to do everything, but they can start with the basics: secure passwords, multi-factor authentication, data access control, and regular backups. These don't cost much but can go a long way. How do global data regulations like GDPR, CCPA, and the Cyber Resilience Act shape the way startups operate? They're reshaping the mindset and that's crucial. A few years ago, cybersecurity was often viewed as a luxury. Many smaller companies thought, 'Why would anyone target us?' That thinking no longer holds. These regulations are forcing accountability. They're saying: If you're collecting user data, you're responsible for securing it. No exceptions. And that accountability builds trust not just with regulators, but with customers. What these regulations have done is establish a baseline culture of cybersecurity. Even if a company isn't directly under the purview of something like GDPR, they often adopt the practices anyway to future-proof their operations. This is especially important as startups scale globally. Do you believe governments should impose stricter cybersecurity regulations on startups, or offer more support instead? Support first, regulations later. Imposing strict rules too early can backfire. Startups, already stretched thin, might try to find workarounds just to stay in business. What governments should do instead is invest in capacity-building offer grants, training programs, and subsidized tools. Help small businesses adopt best practices without breaking their budgets. Once there's a baseline maturity in the ecosystem, then phase in stricter compliance rules. This layered or phased approach is more sustainable and more effective in the long run. There's talk of a cybersecurity talent shortage. Is it really that hard to find skilled professionals? There's no shortage of interest but there is a gap between certifications and real-world skills. Many candidates have credentials but lack hands-on experience. Startups, in particular, need practical problem-solvers, not just textbook experts. What we need more of are experiential learning platforms, internships, cyber ranges, environments where people can learn by doing. For founders, my advice is to hire based on potential and adaptability. You might not be able to compete with tech giants on salary, but you can offer learning, autonomy, and purpose, which many securities professionals' values just as much. If you could give one piece of cybersecurity advice to every new founder, what would it be? Don't let lack of budget stop you from doing something. There are tons of free and low-cost resources out there from SANS to OWASP to NIST guidelines. You can absolutely build a minimal, but meaningful, cybersecurity foundation even if you're bootstrapping. Treat cybersecurity like any other critical function, your dev team, your HR, your marketing. It's not optional anymore. Even a basic security hygiene culture can drastically reduce your risk. Do you think cybersecurity will eventually be seen as a fundamental utility, as essential as electricity or water? Without a doubt. We already rely on digital infrastructure for everything, finance, healthcare, transportation, energy. If any of these go down due to a cyberattack, the consequences are devastating. Cybersecurity is no longer just about protecting data. It's about protecting lives and national security. We're also seeing how cyber warfare is becoming a central strategy in geopolitical conflicts. So yes, cybersecurity will and should, become a default layer of modern society. It's the new electricity. Invisible, but absolutely essential. Vivek Chandran's message to founders is clear: cybersecurity is a necessity, not a luxury. Startups may face budgetary and staffing constraints, but that's no excuse for ignoring the risks. From AI-driven threats to phishing scams and regulatory pressures, the cyber battlefield is real, and unforgiving. Fortunately, knowledge is power. And as Vivek points out, the tools to get started are already out there, many of them free. For founders in 2025, the goal isn't perfection, it's proactive protection