logo
Nozomi Networks enhances critical infrastructure security amid evolving cyber threats

Nozomi Networks enhances critical infrastructure security amid evolving cyber threats

Tahawul Tech15-05-2025
The cybersecurity landscape is rapidly changing, with digital technologies increasingly integrated into industrial control systems. This digital transformation has introduced new risks, especially with the rise of AI-driven cyber threats. Nozomi Networks is leading the way in securing critical infrastructure, offering solutions that ensure comprehensive protection across OT, IoT, IT, and wireless assets. In this interview, Anton Shipulin, Industrial Cybersecurity Evangelist at Nozomi Networks, discusses how the company addresses these evolving threats and helps organisations comply with stringent regulatory requirements while safeguarding critical and renewable infrastructure.
How does Nozomi secure critical infrastructure in the region amid evolving cybersecurity threats, and how does it contribute to improving operational efficiency?
Critical infrastructure is vital for a nation's cybersecurity and the functioning of the country. Essential services such as water, electricity, and oil and gas energy rely heavily on these systems, and it is crucial to ensure their continuous, uninterrupted operation. With the rapid digital transformation and the integration of advanced technologies into control systems managing critical infrastructure, these systems are increasingly dependent on digital components. However, this dependence introduces new risks.
Unauthorised access and potential cyberattacks pose significant threats to these systems, as malicious actors can exploit vulnerabilities to gain control. It is crucial to monitor these systems closely and identify any deviations from normal operations. Detecting cyberattacks, process anomalies, or other irregular behaviours at an early stage is essential for maintaining security and ensuring the longevity of these facilities.
Nozomi Networks addresses these challenges by providing real-time monitoring of network traffic, process telemetry, vulnerabilities, and asset changes within industrial control systems. This approach allows for the timely detection of anomalies and attacks, enabling prompt responses to safeguard critical infrastructure and ensure its resilience.
How can organisations achieve full-spectrum protection across OT, IoT, IT, and wireless assets, and what solutions does Nozomi offer to address these complex security challenges?
Our primary focus is on securing industrial control systems and cyber-physical systems, including the Internet of Things (IoT). When it comes to industrial control systems, they often comprise a variety of components, including pure OT elements like controllers and PLCs, as well as IT components such as network devices, routers, switches, PCs, laptops, and servers running traditional operating systems like Windows.
It is critical not to focus solely on protecting OT systems. Rather, organisations must ensure protection across all components surrounding these critical systems. To address this, our solution expands beyond just supporting OT protocols. While we excel in supporting OT protocols with deep packet inspection for anomaly detection and attack identification, we also support IT systems and the most common IT protocols like DNS, SNMP, and others. This is achieved through passive network monitoring, which ensures visibility across both OT and IT environments.
For enhanced asset visibility and discovery, we've added active discovery components, including smart polling, which queries devices for details. Additionally, we've expanded our solutions to incorporate various types of sensors, including network sensors and recently, endpoint sensors. These endpoint sensors can be deployed on systems such as Windows, Linux, and MacOS, especially in areas where network sensors cannot be installed.
Furthermore, with the increasing adoption of wireless networks in industrial environments, it is essential to monitor and protect these networks to prevent unauthorised access. In some cases, clients may prohibit wireless networks entirely. However, even in such scenarios, monitoring wireless communications remains vital to detect unauthorised devices, such as rogue wireless access points or USB dongles, that could pose a security risk.
Overall, Nozomi offers a comprehensive solution that ensures protection across wireless networks, wired networks, and endpoints, providing organisations with full-spectrum security across their OT, IoT, IT, and wireless assets.
With the rise of AI-driven cyber threats, how do you see the threat landscape evolving, and what steps is Nozomi taking to stay ahead of these emerging risks?
The rise of AI technologies is both a beneficial and accelerating force for cybersecurity, but unfortunately, it is also being exploited by cybercriminals to enhance their attacks. Attackers leverage AI for tasks such as vulnerability scanning, spam generation, and even coding attacks. This makes it easier for them to create new and more sophisticated attacks, accelerating the pace of the threat landscape.
For organisations, this presents a significant challenge, as AI-driven threats allow attackers to quickly evolve their methods, making it critical for asset owners to detect these attacks in a timely and precise manner. This is where Nozomi Networks focuses its efforts. Our solution is not only designed for network detection but also for understanding industrial and IoT protocols, which is crucial in accurately identifying attacks.
As the frequency and complexity of attacks grow, the amount of data that needs to be processed increases exponentially, making it harder to correlate and analyse all the relevant information. To address this challenge, we integrate AI and machine learning into our platform for alert correlation and generating insights. These technologies help us manage and analyse vast amounts of data, allowing us to detect threats more effectively.
Moreover, as more industrial automation vendors and cloud providers implement AI-based systems, it is essential to protect these components from potential threats. AI-based systems themselves are now vulnerable, and our focus includes monitoring attempts to attack these systems, ensuring that they are adequately safeguarded.
Nozomi is adapting to the evolving threat landscape by incorporating AI and machine learning for better threat detection and data processing, while also expanding our focus to protect AI-based systems in industrial automation and cloud environments.
Could you share insights into Nozomi's complete cyber-physical protection offerings, particularly in securing critical and renewable infrastructure? How do your solutions enable compliance in highly regulated sectors?
Nozomi's solution focuses on comprehensive monitoring across a wide range of environments, including wireless networks, endpoint activities, and IoT systems. Our offerings include a diverse set of sensors for network, wireless, and endpoint monitoring, alongside management components for on-premises environments and cloud-based components for information collection and analysis.
By providing real-time visibility and continuous monitoring, our solutions ensure that critical infrastructure, including renewable energy systems, is secured against potential cyber threats. Furthermore, our solutions help organisations meet the compliance requirements of highly regulated sectors by ensuring that all systems are continuously monitored, vulnerabilities are detected early, and appropriate actions are taken to mitigate risks in real time.
How does Nozomi ensure compliance with highly regulated sectors, especially considering the growing number of cybersecurity frameworks and regulations globally?
Compliance with cybersecurity regulations is increasingly important, with various frameworks emerging across the globe, such as those in Europe, the United States (e.g., New York City's cybersecurity regulations), and other regions. One of the key elements of compliance is ensuring proper asset discovery, asset management, threat detection, and vulnerability management.
To help organisations meet these regulatory requirements, Nozomi offers comprehensive solutions that focus on asset discovery, threat detection, and vulnerability identification. By addressing these key components, our solutions ensure the security of critical networks and data, enabling organisations to comply with regulations while also enhancing their overall cybersecurity posture.
Image Credit: Nozomi Networks
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

What an Interest Rate Hike Means for You
What an Interest Rate Hike Means for You

UAE Moments

timean hour ago

  • UAE Moments

What an Interest Rate Hike Means for You

How Rising Interest Rates Affect Consumers, CEOs, and Businesses You've likely heard the news: 'The central bank is raising interest rates.' It may sound technical and far removed from your daily life, but in reality, it is an economic tool that directly affects your finances and investment decisions. So, what does this mean? Think of the economy as a car traveling at high speed. When the economy grows too quickly—as if the car is going 100 miles per hour—the 'engine' begins to overheat. This is what we call inflation, where prices for everything—from gasoline to groceries and everyday services—rise rapidly. Inflation reduces the value of money and makes purchasing more expensive over time. The central bank is the driver. To slow the car down and prevent an economic crash, it applies the brakes. An interest rate hike is the brake. How the 'Brakes' Work The central bank raises the interest rate it charges commercial banks to borrow money. In response, these banks increase the interest rates they charge their customers for loans such as mortgages, car loans, and credit cards. This makes borrowing more expensive, which triggers a ripple effect across the economy: Buying a home becomes more expensive: Higher mortgage rates mean larger monthly payments for the same property. This reduces demand in the housing market and helps prevent housing price bubbles. Car loans become costlier: Increased interest on car loans means paying more over the life of the loan, leading some individuals to reconsider buying a new car or making large investments. Credit card debt becomes harder to manage: Higher interest on credit card balances increases the cost of servicing debt, encouraging consumers to spend less and adopt more cautious financial behavior. The Balance Required The goal of raising interest rates is to gradually reduce demand. As individuals and businesses borrow and spend less, overall demand for goods and services declines, helping to slow inflation. Achieving the right balance is critical—the central bank wants to slow the 'accelerating economy' without stopping it entirely or, worse, causing a recession. Why This Matters to CEOs and Business Owners For executives and business leaders, higher interest rates mean increased financing costs for your company, whether for a new project, expansion, or hiring teams. Small and medium-sized enterprises (SMEs) may be particularly affected, as they rely heavily on bank loans for growth. On the other hand, financial institutions may benefit from wider lending margins. In the end, an interest rate hike is not a distant or abstract policy—it is a practical tool used by central banks to guide the economy, maintain price stability, and protect your money and investments from the effects of excessive inflation.

Saudi EXIM: Bolstering non-oil exports from Saudi Arabia
Saudi EXIM: Bolstering non-oil exports from Saudi Arabia

Zawya

time2 hours ago

  • Zawya

Saudi EXIM: Bolstering non-oil exports from Saudi Arabia

Saudi Export-Import Bank (Saudi EXIM) was established in February 2020. Its core mission is to promote non-oil exports from Saudi Arabia and enhance their presence and competitiveness in regional and global markets by bridging financing gaps and mitigating export risks and by building international trade partnerships. Saudi EXIM is a government agency operating under the supervision of the National Development Fund (NDF), led by the Bank's CEO, H.E. Eng. Saad bin Abdulaziz Alkhalb. Saudi EXIM offers trade finance and credit insurance for national exporters to grow their business overseas, and also provides short and medium-term financing options for Saudi exporters and international buyers of Saudi products and services. Saudi EXIM operates in line with global best practices and collaborates with commercial banks and local and international financial institutions to provide integrated financial services for export financing and insurance - facilitating trade between exporters and importers. As a member of leading international trade and economic organizations, including Aman Union, G-NEXID, and the Berne Union, the Bank strengthens its position in the global business community, credibility, and fosters confidence in Saudi exports through enhanced risk management and international collaboration. The work of the bank is closely tied to the economic diversification goals of the Saudi Vision 2030 transformation program which include increasing the total export value of the non-oil sector from 16% to 50% of GDP by 2030. Since its establishment, Saudi EXIM has been a key driver of sustainable economic growth and local content development. Over the past five years, it has extended more than USD 22 billion in credit facilities. The Bank has also secured an A+ long-term issuer credit rating for both foreign and local currencies from Fitch Ratings, with a stable outlook. In 2024, the Bank achieved a significant breakthrough in the scale and impact of its credit operations. The total value of credit facilities reached USD 8.93 billion, marking a 103% increase compared to 2023. This reflects the Bank's growing role as a key driver in enabling Saudi Arabia's non-oil exports. These facilities included USD 3.19 billion in direct export financing and USD 5.75 billion through export credit insurance programs, raising the Bank's contribution to total non-oil export credit facilities to 7.66%. This serves as a clear indicator of Saudi EXIM's expanding economic footprint in supporting global market access for Saudi products and services. To date, the Bank has signed over 70 MoUs, along with a wide range of financing and insurance agreements, as well as partnerships with international and local banks, financial and commercial institutions, global trading houses, export credit agencies (ECAs), and several relevant multilateral organizations. Milestones include partnerships with major global trading houses such as Trafigura and Glencore, a strategic reinsurance agreement with Allianz Trade to cover supply chains in over 50 countries, and a landmark letter of credit insurance agreement with SABIC — the largest of its kind in the Middle East and a regional first. The Bank launched the Bridges Initiative (Jusoor) to empower Saudi manufacturers by streamlining the import of raw materials and equipment more efficiently. This is achieved through tailored financing and insurance solutions. Covering imports from over 70 countries to support strategic industries such as mining, automotive, aviation, and renewable energy, in full alignment with the objectives of the National Industrial Strategy. The Bank remains committed to deepening collaboration through strategic partnerships and international memberships, aiming to address exporter challenges through innovative solutions while building strong commercial ties that promote mutual interests and support national development objectives.

Proactive cyber defence: Managing the growing risk of zero-day vulnerabilities
Proactive cyber defence: Managing the growing risk of zero-day vulnerabilities

Gulf Business

time8 hours ago

  • Gulf Business

Proactive cyber defence: Managing the growing risk of zero-day vulnerabilities

Image: Supplied In today's digitally driven world, the race between cyber attackers and defenders is more intense than ever. Every enterprise, regardless of industry, relies on a vast web of interconnected systems, cloud services, on-prem applications, and hybrid collaboration tools. This interconnectedness, while essential for agility and growth, introduces a critical risk: the exploitation of zero-day vulnerabilities. The recent This flaw, which allows unauthenticated remote code execution, was actively exploited in the wild before any formal patch was released. It's a textbook case of how attackers continue to innovate and why organisations must rethink how they manage cyber risk, especially for unknown and unpatched threats. Zero-day realities: Not 'if,' but 'when?' Zero-days are by nature invisible, until they're not. They represent flaws in software or systems that developers and defenders aren't yet aware of, but attackers may have already discovered and weaponised. This asymmetry creates a dangerous window of opportunity for malicious actors. In ToolShell's case, attackers were able to execute arbitrary code remotely, potentially gaining full control of affected systems. While this particular case is notable, it is by no means unique. Whether targeting collaboration platforms, email servers, web frameworks, or even security tools themselves, zero-day vulnerabilities are becoming a standard tactic in the modern attacker's playbook. This brings forth a pressing question: how can organizations prepare for threats they cannot see? Building cyber resilience: From reactive to proactive Effective cybersecurity in the face of zero-day threats requires a multi-layered and forward-looking strategy. Here are five key focus areas every organization should adopt: Assume breach and minimise blast radius The first shift in mindset must be this: assume a breach is inevitable. This isn't pessimism, it's realism. By adopting an 'assume breach' posture, companies can invest in segmentation, access controls, and identity protections that limit how far an attacker can move once inside. Privileged access should be limited, lateral movement should be monitored, and sensitive data must be isolated. Adopt extended detection and response (XDR) Detection is no longer enough; organizations need tools that correlate behavior across endpoints, identities, cloud workloads, and networks. XDR platforms provide that visibility, enabling faster detection of anomalies and coordinated response across environments. When a zero-day is exploited, the ability to see the full kill chain and isolate affected systems becomes mission-critical. Invest in threat intelligence and real-time updates Staying ahead means being informed. Enterprises should subscribe to threat intelligence feeds and work with cybersecurity partners who offer real-time updates, including Indicators of Compromise (IOCs) and hunting queries, even before public advisories are issued. Early detection and context-rich threat intel can dramatically reduce dwell time and response lag. Integrate vulnerability management with active monitoring Traditional vulnerability management often runs on a monthly cadence, too slow for today's environment. Modern organizations need continuous vulnerability exposure assessments that integrate with their detection tools. If a system is found to be vulnerable, real-time flags should trigger proactive isolation or prioritization in patch pipelines. Foster cross-team collaboration and executive visibility Cyber risk is a business risk. IT, security, and executive leadership must collaborate closely to ensure that the organization's risk tolerance, response protocols, and communication plans are well understood and exercised. Business continuity planning should include simulations for zero-day incidents — not just ransomware or known malware. From defence to anticipation While patching known vulnerabilities remains essential, organsations can no longer rely solely on post-exploit remediation. The key lies in anticipating threats through behavioral analysis, automated response, and architectural resilience. Emerging technologies, including This level of proactive defense is increasingly becoming the gold standard. It's also critical to eliminate blind spots. Tools should be able to detect unexpected process executions, unusual SharePoint or IIS behaviors, and anomalous command-line arguments, signs that something like ToolShell may be at play. Staying one step ahead Zero-days will continue to surface. Some may grab headlines; many will fly under the radar. But the organisations that thrive in this reality are those that don't wait for the news to act. They invest in proactive visibility, rapid containment, and flexible response strategies. The ToolShell vulnerability may fade from news cycles in weeks, but the lesson it carries must remain: in cybersecurity, speed and preparedness make all the difference. The winners are those who treat zero-day defense not as a one-time effort, but as a core capability woven into the fabric of their technology, their processes, and their culture. The writer is senior director, solutions engineer at SentinelOne, a global leader in AI-powered cybersecurity.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store