Latest news with #CenterForInternetSecurity


Gulf Business
a day ago
- Business
- Gulf Business
Insights: Gulf ports face new security challenges as trade ambitions accelerate
Image: Supplied Ports have evolved beyond their role as trade gateways. Today, they stand as critical pillars of national resilience and economic continuity. In the modern-world, where over 80 per cent of global trade moves by sea and the Gulf plays a central role in global energy and logistics, port security should not be viewed as a cost or a compliance exercise. It must be treated as a vital economic enabler. Without strong and modern security, the Gulf's ambitions to lead in manufacturing, trade, and supply chain integration will remain a challenge. At the recent 'Make it in the Emirates' forum, the UAE laid out a bold industrial vision. Officials highlighted that local manufacturers can now access a global market of 2.5 billion people. Free zones, re-export hubs, and logistics corridors powered by ports including The threat landscape is escalating Port security has moved far beyond fences and surveillance cameras. Today, it involves tackling everything from phishing attempts and cyber intrusions to insider threats and the growing risk posed by smuggling, irregular migration, modern-day slavery and autonomous drones. According to the Center for Internet Security, malware-based attacks rose by 30 per cent in the first half of 2024, with a staggering 92 per cent increase recorded in May alone. These figures are not abstract. They represent very real risks that port operators face daily while trying to maintain efficient operations. Rising geopolitical tensions, from unrest in the Red Sea to broader regional flashpoints, are putting new pressure on Gulf ports. Ensuring their resilience is no longer just about protecting trade. It is now central to national security and regional stability. Compliance is the starting line, not the finish Most Gulf ports meet the basic international security standards under the ISPS Code. But that is not enough. Compliance provides a framework, not a solution. Too often, operators treat it as a checklist rather than a foundation. True resilience requires a different mindset. Port security should not be seen as an obstacle to trade but as a core pillar of competitiveness.. Jebel Ali Port is a leading example. Its global reputation was not earned by simply meeting minimum standards. Its success is the result of ongoing risk assessments, continuous training, and a proactive approach to every aspect of security – particularly in its adoption of technology and its integration into its production primacy approach. This is a model that other ports in the region can learn from and adapt. Integration is the future of security Modern ports function as complex ecosystems. They bring together free zones, logistics providers, customs authorities, and digital infrastructure into a single operational environment. Within this space, security must be fully integrated. Physical access control, cybersecurity protocols, intelligent surveillance, and emergency response planning all need to work together as one. Technology plays a critical role. From biometric access systems to artificial intelligence for threat detection, there are advanced tools that can help enhance security. However, these tools are only effective when guided by skilled professionals with the right training. As Bill Gates once noted, automation applied to an inefficient operation only magnifies the inefficiency. Without strong processes and capable people, even the best technology will fall short. The Gulf's advantage must be used wisely The Gulf has already demonstrated that it can deliver world-class infrastructure. The next frontier is building secure infrastructure that can adapt and evolve with emerging risks. This will require moving beyond paper-based plans and embracing real-world testing. Scenario-based exercises and crisis simulations should become standard practice. Security cannot be a one-time investment. It must be embedded into the daily culture of port operations. Governments and private sector operators must also collaborate more closely. Intelligence sharing, regional coordination, and the development of Gulf-specific security standards can raise the overall r At the heart of this transformation is human capital. The region must invest in developing a new generation of trained and trusted security professionals who understand both physical and digital threats. Security is an investment in growth A single breach at a Gulf port would do more than delay containers. It could disrupt entire supply chains, shake investor confidence, and damage the region's reputation as a dependable trade partner. In a global economy driven by trust, security is no longer optional. It is a non-negotiable investment in sustainable growth. One of the Gulf's strengths lies in its ability to build with foresight. Unlike older ports that are burdened with legacy systems, Gulf ports can design modern security architecture from day one. The UAE, Saudi Arabia, and Oman have already begun this journey by introducing smart surveillance systems, AI-driven monitoring, and integrated command centers. These are promising steps, but more must be done. A final question for the region Port security should not be treated as a side function or a technical afterthought. It is central to growth, to national strength, and to the region's future as a global trade and industrial hub. The Gulf can lead not just in port development but in redefining what secure, resilient trade infrastructure looks like for the rest of the world. As the region accelerates toward a more industrial and interconnected future, one question must be asked. Are we just expanding our ports, or are we securing our prosperity? The answer will determine how far and how smart, secure, and geen the Gulf travels on the path to economic leadership. The writer is the CEO at Neptune P2P Group.


CBS News
14-05-2025
- CBS News
$28 million in Texas' cybersecurity funding for schools left unspent
The first call came in the early hours of the morning in the fall of 2021, informing the Allen Independent School District Director of Technology, Nelson Orta, that there was an issue. A ransomware attack had paralyzed Allen schools. "We got people back online that same day, within hours," Orta said. "But behind the scenes, there's a lot happening." For the next three months, Orta said the district underwent a massive repair and investigation operation. It was a process that turned out to be costly. School records obtained by the I-Team show that while Allen ISD never sent a penny in ransom to hackers, between security contractors, IT repairs and legal fees, the response to this one cyberattack cost the district more than $385,000. "The reality is that these things cost money," Orta said. "Defending against threats, modernizing and upgrading, having staff that knows how to do those things and can implement and monitor on a daily basis, costs money." Schools and cybersecurity Allen ISD isn't alone. Schools have become prime targets for computer hackers. Between July 2023 and December 2024, 82% of K-12 schools experienced a cyberattack, according to a report from the Center for Internet Security. That same report showed 86% of schools said a lack of funding was their top concern in defending against cyberattacks. To address the issue in Texas, two years ago, state lawmakers set up the K-12 Cybersecurity Initiative, setting aside $55 million to help schools protect their computer systems. But despite the need, the I-Team found that nearly two years into the program, only a fraction of the money has been used. Leaving money on the table Of the more than 900 school districts in Texas, only 300 had applied as of January 2025, according to records from the Texas Education Agency. By the time this two-year program ends in September, $28 million will be left on the table. The TEA said many school districts were hesitant to apply, fearing that if the funding ends, they would have to pull money from other parts of the budget or quickly change cybersecurity plans. Other districts didn't apply because they didn't initially qualify. When the program was first unveiled, only districts with fewer than 15,000 students were eligible. The threshold has since been raised to districts with fewer than 50,000 students. See the map below for details on which school districts have applied for assistance from the K-12 Cybersecurity Initiative: While hundreds of districts didn't apply, many that did said the program has helped them enhance security in ways they wouldn't have been able to otherwise. Megan Corns, the Chief Technology Officer at Red Oak ISD, said she "absolutely" believes the program has helped prevent a cyber incident. The district received nearly $30,000 from the state. She said the money paid for a cyber detection response system. "Which really just provides us a security guard to watch over all the devices and tell us if there's anything malicious on a device," Corns said. "That's something that I couldn't staff. I'm not going to be able to have a staff member that's going to be able to watch all of the devices at the same time." As of January, the state reported that detection response systems funded by the program have blocked more than 1,400 ransomware-related activities. In April, Allen ISD became the latest school district to benefit from the K-12 Cybersecurity Initiative. The district received $175,000. In an email to the I-Team, a TEA spokesperson said that while "the program took some time to get started," the agency expects more school districts to apply if funding is renewed for another two years. The TEA is asking state lawmakers for $42 million to fund the program through September 2027.