logo
#

Latest news with #CyberResilienceAct

How AI Is Reinventing Cybersecurity For The Automotive Industry
How AI Is Reinventing Cybersecurity For The Automotive Industry

Channel Post MEA

time22-04-2025

  • Automotive
  • Channel Post MEA

How AI Is Reinventing Cybersecurity For The Automotive Industry

By Alain Penel, VP of Middle East, CIS & Turkey at Fortinet Autonomous and electric vehicle uptake is rising across the Middle East, driven by national agendas and a growing push for sustainable mobility. With this rapid growth however comes an urgent need to address cybersecurity at every stage of the automotive value chain. Artificial Intelligence (AI) is at the heart of this shift; transforming not only how vehicles operate, but also how cyber threats are identified, mitigated, and prevented. From predictive maintenance to driver behaviour analytics, AI is streamlining processes and unlocking efficiencies. But it is also redefining the security perimeter for automotive organisations. Forces Influencing AI Adoption in Automotive As the industry evolves, three forces are shaping the current landscape: stricter regulations, rapid AI integration, and a fundamental change in communication infrastructure. Regulations such as the Cyber Resilience Act and NIS2 for example are introducing more granular compliance mandates, especially for sectors handling critical infrastructure. Meanwhile, AI is accelerating business and individual learning processes. At the network level, the need for faster communication and bandwidth adaptability is giving rise to next-generation connectivity frameworks that can support AI-native systems. This evolution in infrastructure and intelligence also promotes a significant shift in cybersecurity from reactive to preventive. AI is increasingly being used to analyse threat landscapes and internal vulnerabilities in real-time. This shift enables organisations to prepare for attacks before they happen, leveraging behavioural analytics and high-speed correlation to stay ahead of potential breaches. Hardware acceleration and software development, guided by AI, are now setting the pace for how cybersecurity evolves across the industry. The Impact of Cybersecurity Unsurprisingly, automotive enterprises are becoming high-value targets for cybercriminals. Three core factors contribute to this trend; the financial opportunity of holding connected services hostage, the complexity of digital supply chains, and the vast amount of sensitive data being generated. With every vehicle connected to cloud-based services, a single breach can have wide-ranging brand, operational, and financial repercussions. Moreover, the ecosystem of third-party vendors involved in producing autonomous and electric vehicles significantly expands the attack surface. The use of digital twins and advanced manufacturing technologies further intensifies the volume of valuable data. This information ranging from user behaviour patterns to proprietary designs is not only attractive to attackers but also becomes a tool for launching future attacks or selling on the dark web. AI Transformations in the Automotive Supply Chain AI is also transforming the automotive supply chain. Predictive maintenance for example – as opposed to scheduled or reactive vehicle maintenance, which until now has been the norm – enables companies to forecast part failures, optimise distribution, and reduce warehousing costs. AI can analyse and synthesise so many data streams that this guessing game becomes much more accurate. Not only does this mean more reliable vehicles for the consumer, but it also means that each element of demand can be optimised. Driver behaviour analysis and in-cabin monitoring systems powered by AI are also enhancing safety, particularly for long-haul truck drivers exposed to risks such as fatigue and theft. These AI-powered innovations are already helping companies reduce operational costs while improving customer satisfaction. Strengthening security across the supply chain means embedding real-time monitoring, mapping data flows, and building a fast, coordinated response to incidents. The introduction of cyber resilience principles encouraged by regulatory bodies requires organisations to maintain robust and sustainable response mechanisms. AI can help with this. AI's Role in Automotive Cybersecurity The future of AI in automotive cybersecurity lies in its ecosystem-wide integration. Multimodal AI models that can process text, images, and design data are already in use. But the next phase involves combining internal and external intelligence to strengthen risk postures. Synthetic data created specifically to train internal models without exposing real user data is becoming an important asset in speeding up AI development while preserving privacy. The impact of AI can be summarised as transformative, dual-edged, and adaptable. It is enhancing cybersecurity readiness, being weaponised by attackers, and empowering businesses to evolve quickly in a changing environment. As the Middle East embraces connected mobility and smart transportation, the conversation must move beyond adopting AI to implementing it securely and intelligently. The road to the future may be autonomous, but its success will hinge on cybersecurity built for adaptability, speed, and scale. 0 0

How AI is reinventing cybersecurity for the Automotive Industry
How AI is reinventing cybersecurity for the Automotive Industry

Tahawul Tech

time22-04-2025

  • Automotive
  • Tahawul Tech

How AI is reinventing cybersecurity for the Automotive Industry

Alain Penel, VP of Middle East, CIS & Turkey at Fortinet, explores how AI is quietly becoming the invisible co-pilot in every connected vehicle—monitoring, predicting, and preventing cyber threats before they can hit the brakes on progress. Autonomous and electric vehicle uptake is rising across the Middle East, driven by national agendas and a growing push for sustainable mobility. With this rapid growth however comes an urgent need to address cybersecurity at every stage of the automotive value chain. Artificial Intelligence (AI) is at the heart of this shift; transforming not only how vehicles operate, but also how cyber threats are identified, mitigated, and prevented. From predictive maintenance to driver behaviour analytics, AI is streamlining processes and unlocking efficiencies. But it is also redefining the security perimeter for automotive organisations. Forces Influencing AI Adoption in Automotive As the industry evolves, three forces are shaping the current landscape: stricter regulations, rapid AI integration, and a fundamental change in communication infrastructure. Regulations such as the Cyber Resilience Act and NIS2 for example are introducing more granular compliance mandates, especially for sectors handling critical infrastructure. Meanwhile, AI is accelerating business and individual learning processes. At the network level, the need for faster communication and bandwidth adaptability is giving rise to next-generation connectivity frameworks that can support AI-native systems. This evolution in infrastructure and intelligence also promotes a significant shift in cybersecurity from reactive to preventive. AI is increasingly being used to analyse threat landscapes and internal vulnerabilities in real-time. This shift enables organisations to prepare for attacks before they happen, leveraging behavioural analytics and high-speed correlation to stay ahead of potential breaches. Hardware acceleration and software development, guided by AI, are now setting the pace for how cybersecurity evolves across the industry. The Impact of Cybersecurity Unsurprisingly, automotive enterprises are becoming high-value targets for cybercriminals. Three core factors contribute to this trend; the financial opportunity of holding connected services hostage, the complexity of digital supply chains, and the vast amount of sensitive data being generated. With every vehicle connected to cloud-based services, a single breach can have wide-ranging brand, operational, and financial repercussions. Moreover, the ecosystem of third-party vendors involved in producing autonomous and electric vehicles significantly expands the attack surface. The use of digital twins and advanced manufacturing technologies further intensifies the volume of valuable data. This information ranging from user behaviour patterns to proprietary designs is not only attractive to attackers but also becomes a tool for launching future attacks or selling on the dark web. AI Transformations in the Automotive Supply Chain AI is also transforming the automotive supply chain. Predictive maintenance for example – as opposed to scheduled or reactive vehicle maintenance, which until now has been the norm – enables companies to forecast part failures, optimise distribution, and reduce warehousing costs. AI can analyse and synthesise so many data streams that this guessing game becomes much more accurate. Not only does this mean more reliable vehicles for the consumer, but it also means that each element of demand can be optimised. Driver behaviour analysis and in-cabin monitoring systems powered by AI are also enhancing safety, particularly for long-haul truck drivers exposed to risks such as fatigue and theft. These AI-powered innovations are already helping companies reduce operational costs while improving customer satisfaction. Strengthening security across the supply chain means embedding real-time monitoring, mapping data flows, and building a fast, coordinated response to incidents. The introduction of cyber resilience principles encouraged by regulatory bodies requires organisations to maintain robust and sustainable response mechanisms. AI can help with this. AI's Role in Automotive Cybersecurity The future of AI in automotive cybersecurity lies in its ecosystem-wide integration. Multimodal AI models that can process text, images, and design data are already in use. But the next phase involves combining internal and external intelligence to strengthen risk postures. Synthetic data created specifically to train internal models without exposing real user data is becoming an important asset in speeding up AI development while preserving privacy. The impact of AI can be summarised as transformative, dual-edged, and adaptable. It is enhancing cybersecurity readiness, being weaponised by attackers, and empowering businesses to evolve quickly in a changing environment. As the Middle East embraces connected mobility and smart transportation, the conversation must move beyond adopting AI to implementing it securely and intelligently. The road to the future may be autonomous, but its success will hinge on cybersecurity built for adaptability, speed, and scale. Image Credit: Fortinet

Cyver Core Reports 50% Reduction in Pentest Reporting Time with Generative AI
Cyver Core Reports 50% Reduction in Pentest Reporting Time with Generative AI

Associated Press

time17-03-2025

  • Business
  • Associated Press

Cyver Core Reports 50% Reduction in Pentest Reporting Time with Generative AI

AMSTERDAM, March 17, 2025 (GLOBE NEWSWIRE) -- Cyver Core (Cyver BV) reports business results for cybersecurity teams leveraging automation with GenAI. 'Cyver Core delivered a Generative AI product to our users in 2024 and since then, we've seen significant results on time-savings, especially across enterprise teams. Reporting obligations are greatly reduced, freeing up skilled labor for value-added tasks and reducing the need for additional hires inside over-burdened teams,' said Luis Abreu, CEO of Cyver Core. 'Those cost savings can't be ignored in a world where the World Economic Forum predicts we have a shortage of some 4 million cybersecurity professionals.' Cybersecurity teams are under more time pressure than ever Today, the World Economic Forum suggests that there's a global shortage of some 4 million cybersecurity professionals. 67% of organizations report a moderate-to-critical skills gap in cybersecurity. New threats like AI-driven attacks and the option to generate malware mean attacks have increased as much as 7x, leaving cybersecurity teams stretched. Attacks on open-source supply chains have also increased by as much as 700% over the last 3 years. That's further stretched by recent changes to global cybersecurity regulation, most notably the European Union's NIS2 and Cyber Resilience Act, the US National Cybersecurity Strategy, and even the Singapore Operational Technology Cybersecurity Masterplan. Those regulations increase the burden for cybersecurity testing inside of organizations, especially critical infrastructure, while shifting personal responsibility to cybersecurity leads. Much of what cybersecurity teams spend their time on is not cybersecurity Despite the shortage in skilled labor, many cybersecurity teams still invest a significant portion of time into overhead work. One survey showed that 20-60% of pentest project time is spent on reporting. Cybersecurity professionals spend an average of 2-14 hours per cybersecurity assessment on reporting. With red teaming and threat-led pentesting, those timelines can increase by 35% or more. Many of those reports are 100+ pages and must be further broken down as a second step to enable remediation and fixes. Inside organizations, cybersecurity teams spend 20%+ of their time manually managing findings. Reducing time spent on overhead and reporting with GenAI With Cyver Core's generative AI solutions, that time expenditure drops by 85%. Where teams without Cyver Core report spending 50-70% of reporting time on copy paste, teams using Cyver Core reduce that to just 16-20%. Cyver Core's generative AI product for pentest reporting writes custom descriptions, remediation information, and is able to generate drafts from lists of information. Using it, cybersecurity professionals report that time writing unique content goes from 20-70% of report time to 20%. In addition, the total time per report drops from 4-14 hours to 2-5 hours, saving 50% across even the most complex of reporting projects. Those time savings are consistent across 50+ initial adopters, including multiple enterprise teams encompassing Fortune 100s. Across the full group, users saw an average 50% reduction in time-to-report, with 79% of cybersecurity teams saying they were able to complete more projects. At Cyver Core, we deliver pentest report automation and pentest management through a cloud platform. With tools to automate overhead like reporting plus workflows and team management, Cyver Core is designed around the needs of pentest teams to take the focus off managing work and bring it back to cybersecurity and remediation. Contact Founder / CEO Luis Abreu

Exein partners with Supermicro to redefine the future of embedded security
Exein partners with Supermicro to redefine the future of embedded security

Associated Press

time12-03-2025

  • Business
  • Associated Press

Exein partners with Supermicro to redefine the future of embedded security

Exein, the embedded IoT cybersecurity company, and Supermicro, a global leader in application-optimized total IT solutions, have announced a partnership to redefine embedded security. Exein and Supermicro's collaboration will see Exein's cutting-edge embedded security solutions integrated into Supermicro's industry-leading hardware, ensuring unprecedented protection for enterprises worldwide. Together, Exein and Supermicro are raising the bar for cybersecurity in edge computing, IoT, and critical infrastructure—securing the future, one device at a time. With Exein's AI-driven security built directly into Supermicro's hardware, businesses can now deploy infrastructure with zero-trust security from the ground up—ensuring resilience against evolving cyber threats. 'We are honored to partner with Supermicro to bring Exein's next-generation embedded security to their industry-leading solutions. This collaboration ensures that security is not just an add-on, but an integral part of the hardware ecosystem—empowering businesses with AI-driven, zero-trust protection from the core. With Exein's technology, Supermicro's offerings will not only be more resilient against evolving cyber threats but also fully compliant with the Cyber Resilience Act, setting a new standard for secure infrastructure worldwide.' - Gianni Cuozzo, CEO of Exein. The partnership with Supermicro follows Exein's significant industry partnerships in recent months with MediaTek and Integral Systems. As a result of these partnerships Exein's advanced cybersecurity technology will be embedded in billions of IoT devices worldwide. In 2024, Exein successfully closed a €15m Series B round to drive its ambitious global expansion plans across Europe, the US and Asia. ENDS About Exein Exein is a leading embedded IoT cybersecurity company with offices in Italy, Germany, and the US. Focused on device-level security, Exein embeds advanced security measures directly into device software, leveraging edge AI for real-time threat detection and response. Exein technologies protect over 1 billion devices daily across sectors including industrial, automotive, and aerospace, aiming to set the global standard for embedded cybersecurity and build the immune system for digital life. SOURCE: Exein Copyright Business Wire 2025. PUB: 03/12/2025 11:31 AM/DISC: 03/12/2025 11:32 AM

J.S. Held 2025 Global Risk Report: Navigating Cyber Risk in an Era of Evolving Technology & Regulations
J.S. Held 2025 Global Risk Report: Navigating Cyber Risk in an Era of Evolving Technology & Regulations

Yahoo

time25-02-2025

  • Business
  • Yahoo

J.S. Held 2025 Global Risk Report: Navigating Cyber Risk in an Era of Evolving Technology & Regulations

The J.S. Held 2025 Global Risk Report explores regulatory changes and emerging cyber threats, reshaping business risk strategies. JERICHO, N.Y., Feb. 25, 2025 /PRNewswire-PRWeb/ -- Managing cyber risk is no longer a technical necessity but also a strategic imperative in global business. As companies are more interconnected and reliant on artificial intelligence (AI), the Internet of Things, and the rest of the digital ecosystem, they are exposed to greater opportunities and risks. In this video, Senior Managing Director and cybersecurity expert Denis Calderone shares topics covered in the 2025 J.S. Held Global Risk Report focused on managing cyber risk in the year ahead. The global regulatory landscape is evolving rapidly in response to the increasing severity of cyber threats. Governments and regulatory bodies, including the U.S. Securities and Exchange Commission (SEC), the European Union (EU), and the U.S. Transportation Security Administration (TSA), have introduced cybersecurity mandates that require businesses to strengthen their defenses, improve incident reporting, and ensure compliance with new industry standards. The 2025 Global Risk Report by J.S. Held provides perspectives on these regulatory shifts, helping businesses navigate the complexities of cyber risk and compliance. The growing frequency and severity of cyberattacks are reshaping how businesses approach risk management. The J.S. Held 2025 Global Risk Report explores key issues facing business today, including: Business Interruption from Cyber Incidents: High-profile cases like Change Healthcare's 2024 breach demonstrate how cyberattacks can halt operations, lead to regulatory scrutiny, and result in massive financial losses. Reputational and Legal Fallout: Cyber incidents can trigger lawsuits and damage a company's reputation, often leading to prolonged trust recovery periods with customers and investors. Loss of Sensitive Data: Data breaches can expose critical information, including personal, financial, and proprietary data, amplifying risks of identity theft and fraud. Tightening Regulatory Landscape: New cybersecurity laws, such as the EU's NIS2 Directive and Cyber Resilience Act, alongside the US SEC's disclosure rules, demand stricter compliance from businesses in key sectors. Complexities in Cyber Insurance: Many companies lack clarity on whether their policies cover ransomware or meet legal and operational needs, leaving them exposed to potential financial risks. Ransomware Dilemmas and Legal Risks: Paying a ransom may violate international sanctions, creating additional legal complications for organizations already dealing with cyberattacks. Proactive Cybersecurity Enhancements: Companies implementing advanced cybersecurity measures like MFA, EDR, and immutable backup systems improve their defenses and reduce risks of disruption. 'AI-Powered Threat Detection: Artificial intelligence enables companies to identify fraud and cyberattacks faster by analyzing patterns and anomalies in real time, minimizing damage, and reducing costs. Increased Demand for Cyber Insurance: As companies across industries seek better coverage, insurers have opportunities to innovate new products, though exclusionary clauses are becoming more common. Business Continuity and Resilience: Organizations with strong cyber hygiene, incident response plans, and dependency mapping are better prepared for attacks and may benefit from reduced insurance premiums. Cybersecurity risk is just one of the five key areas analyzed in the J.S. Held 2025 Global Risk Report. Other topics include sustainability, supply chain, cryptocurrency and digital assets, AI and data regulations. If you have any questions or would like to further discuss the risks and opportunities outlined in the report, email GlobalRiskReport@ About J.S. Held J.S. Held is a global consulting firm that combines technical, scientific, financial, and strategic expertise to advise clients seeking to realize value and mitigate risk. Our professionals serve as trusted advisors to organizations facing high stakes matters demanding urgent attention, staunch integrity, proven experience, clear-cut analysis, and an understanding of both tangible and intangible assets. The firm provides a comprehensive suite of services, products, and data that enable clients to navigate complex, contentious, and often catastrophic situations. More than 1,500 professionals serve organizations across six continents, including 81% of the Global 200 Law Firms, 70% of the Forbes Top 20 Insurance Companies (85% of the NAIC top 50 Property & Casualty Insurers), and 65% of the Fortune 100 Companies. J.S. Held, its affiliates and subsidiaries are not certified public accounting firm(s) and do not provide audit, attest, or any other public accounting services. J.S. Held, its affiliates and subsidiaries are not law firms and do not provide legal advice. Securities offered through PM Securities, LLC, d/b/a Phoenix IB, a part of J.S. Held, member FINRA/ SIPC or Ocean Tomo Investment Group, LLC, a part of J.S. Held, member FINRA/ SIPC. All rights reserved. Media Contact Kristi L Stathis, J.S. Held, +1 786 833 4864, View original content to download multimedia: SOURCE J.S. Held

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store