logo
#

Latest news with #GISEC

Shaping the future of Exposure Management with AI, Analytics, and collaboration
Shaping the future of Exposure Management with AI, Analytics, and collaboration

Tahawul Tech

time2 days ago

  • Business
  • Tahawul Tech

Shaping the future of Exposure Management with AI, Analytics, and collaboration

Heimir Fannar Gunnlaugsson, Chief Executive Officer at Nanitor, shared insights with on evolving cybersecurity needs, the role of AI, and strategic partnerships during his participation at GISEC Global 2025. Nanitor is a cyber security technology company securing your internal IT specialising in exposure management, continued to make its presence felt at GISEC Global. Heimir Fannar Gunnlaugsson, CEO of Nanitor, discussed the company's ongoing mission to simplify risk visibility, his views on the evolving cybersecurity landscape, and why partnerships and talent development are crucial to meeting tomorrow's challenges. What did Nanitor showcase at GISEC Global 2025? Nanitor is here primarily to support our partners, engage with our distributors, and connect with customers. Our platform focuses on internal IT security, particularly in the area of Threat Exposure Management. We detect and evaluate a wide range of internal security threats, giving our clients a simplified view through our Dimond Vision of their risk posture. This differentiates us in the market and helps organisations act more decisively. How was your experience been at GISEC this year compared to previous editions? GISEC continues to be a dynamic and engaging platform. The footfall, energy, and discussions have been impressive. What stood out this year is the heightened interest in AI—although many are still figuring out what it truly means for their businesses. There's a mix of curiosity and caution, and amid the excitement, the focus must remain on securing the fundamental IT infrastructure. What role will emerging technologies play in shaping exposure management? Technology is evolving rapidly in this field. Advanced methods to expose weaknesses and deep analytics are now integral. At Nanitor, we are offering deeper insights than ever before. AI will certainly become a core part of this journey, bringing with it speed and predictive capabilities. I also foresee extensive collaboration across technology domains—asset discovery, threat detection, and external and internal risk management. These partnerships will drive more cohesive cybersecurity frameworks aiming at Cyber Resilience more than anything else Can you elaborate on the importance of partnerships? Partnerships are core our business, Nanitor is 100% Channel based company as we go to market hand in hand with our partners. We expect partnerships to emerge across asset management, threat detection, exposure analysis, and internal-external security integrations. The alliances will be key to building a more comprehensive exposure management ecosystem. GISEC offers a good glimpse into how these cross-sector collaborations are beginning to take shape. What top trends do you foresee in exposure management for 2025? First, AI will enhance speed and automation. Second, analytics will become more refined, offering actionable insights. Third, remediation strategies will evolve alongside these technologies. The process will grow more complex, but ultimately it will benefit customers by improving their ability to identify and mitigate risks in real time.

Finesse partners with Securiti to bolster data security
Finesse partners with Securiti to bolster data security

Gulf Business

time3 days ago

  • Business
  • Gulf Business

Finesse partners with Securiti to bolster data security

Image credit: Supplied Finesse, a leading digital transformation and AI solutions provider, has announced a strategic partnership with Securiti, the pioneer of the Data+AI Command Center. The announcement was made during the GISEC event and aims to deliver cutting-edge cybersecurity solutions to businesses across the region. This partnership combines Finesse's expertise in digital transformation with Securiti's advanced technologies for managing sensitive data. Together, they offer a robust suite of capabilities tailored to address the complex demands of today's cybersecurity landscape. Enhancing Cyberhub with AI-driven solutions Finesse will integrate Securiti's AI-powered data privacy and security tools into its Cyberhub platform. This integration equips organizations with advanced solutions for protecting sensitive data across both structured and unstructured environments. Cyberhub already includes features such as a Cognitive Security Operations Center (CSOC), automated incident response, AI-driven Zero Trust architecture, and governance frameworks for generative AI. With the addition of Securiti's platforms—Data Vault, Data Leakage Protection, and automated privacy compliance—Cyberhub's offering becomes even more powerful, enabling proactive and scalable cybersecurity strategies. Leadership perspectives on the partnership 'This partnership addresses critical challenges organizations face in securing sensitive data across distributed environments, especially in the cloud,' said Megha Shastri, Vice President – Enterprise Accounts at Finesse. 'Our collaboration with Securiti will give customers continuous visibility and control over their data, reducing risks and ensuring compliance.' Tahir Latif, Chief Privacy Officer (META) at Securiti, added, 'Organisations must balance rapid innovation with strong data security. By automating the discovery, classification, and protection of sensitive data, we provide foundational intelligence that supports downstream security and AI governance.' Advancing PrivacyOps and Ethical AI As AI adoption accelerates, ensuring data privacy and ethical governance becomes a top priority. This partnership will enhance PrivacyOps by introducing greater automation and transparency. The integrated solution supports zero-trust frameworks and encourages responsible AI use across enterprise operations. 'Responsible AI governance begins with responsible data governance,' Latif emphasised. 'Without deep visibility into data flows, deploying AI becomes risky.' Paving the way for the future of cybersecurity The Finesse-Securiti alliance comes at a pivotal moment as businesses face increasing cyber threats and evolving regulatory requirements. Together, these companies aim to create a secure foundation for growth—offering seamless integration of data security, AI governance, and privacy management to organisations in the UAE and beyond.

Redefining cybersecurity distribution with AI-driven innovation enhances threat detection, automates security response
Redefining cybersecurity distribution with AI-driven innovation enhances threat detection, automates security response

Tahawul Tech

time4 days ago

  • Business
  • Tahawul Tech

Redefining cybersecurity distribution with AI-driven innovation enhances threat detection, automates security response

Burhan Abu Baja and Abdurrahman Najar of NXTHOP Technologies share insights on evolving distribution patterns, cybersecurity governance frameworks, AI-driven innovation, cloud adoption, and accelerating tech transitions in the region. NXTHOP Technologies is strategically positioning itself as a key player in the evolving cybersecurity landscape by leveraging AI-driven innovation, customized deployment models, and alignment with regional governance frameworks, as highlighted during GISEC Global 2025. With insights from leaders like Burhan Abu Baja, Chief Solution Sales Strategist, and Abdurrahman Najjar, VP of Sales of NXTHOP Technologies, shared insights with on how NXTHOP is addressing these paradigm shifts. NxtHop plays a key role in guiding enterprises through paradigm shifts in cybersecurity by facilitating the adoption of cybersecurity solutions and enabling seamless transitions from traditional infrastructures, which enhances digital resilience across the region. These shifts, driven by advancements like AI, have transformed threat detection, prevention, and response strategies, requiring organizations to adopt more adaptive, intelligent security frameworks. Interview Excerpts: How has cybersecurity distribution evolved in recent years, and what role is NXTHOP Technologies playing in this transformation? Burhan Abu Baja: In recent years, cybersecurity distribution has rapidly evolved, with the region experiencing a condensed timeline of maturity driven by urgent needs across devices, apps, and cloud access, highlighting the challenge of system compatibility and reliance on APIs. Burhan Abu Baja emphasizes that NXTHOP Technologies plays a pivotal role in this transformation by bridging these gaps through innovative, AI-powered solutions capable of defending against increasingly sophisticated cyber threats, embodying the principle that only AI can combat AI. With so many cybersecurity solutions in the market, how can a business identify the right one, especially across different sectors like startups, SMEs, and conglomerates? Abdurrahman Najjar: There's no one-size-fits-all in cybersecurity. governments within the region have invested significantly in building strong cybersecurity governance frameworks tailored to industries—whether financial, governmental, or critical infrastructure. Our advice: follow these national frameworks. They offer a solid starting point and ensure alignment with compliance and best practices. What sets NXTHOP's distribution model apart from others in the region? Burhan Abu Baja: We focus on filling market gaps by offering a comprehensive portfolio of complementary products rather than competing ones. Our solutions are AI-driven and tailored to business needs. We work closely with partners and customers to align technologies with business objectives, ensuring value, innovation, and healthy margins, without engaging in price wars. We are strictly channel-driven, never selling direct, which ensures focus and support at every stage. How do you support businesses in transitioning from traditional to modern cybersecurity solutions? Abdurrahman Najjar: We provide deployment models suited for every need—cloud, on-premise, or hybrid. Cloud deployment is immediate and adaptable to customer scenarios. On-premise takes slightly longer due to the necessary infrastructure requirements. Hybrid models are ideal for sectors with regulatory constraints. 'Our solutions are designed to integrate easily, and our channel partners ensure swift execution, reducing transition time significantly.' Have you observed a shift in customer preference toward cloud-based cybersecurity solutions in the region? Burhan Abu Baja: Yes, cloud adoption is clearly growing. There are regulatory mandates in countries like Saudi Arabia and the UAE that are accelerating this shift. Even conservative sectors like banking are embracing cloud because of updated compliance standards. NXTHOP ensures all our solutions—whether cloud or on-prem—adhere to national and international cybersecurity regulations. What's your final message to enterprises navigating today's cybersecurity complexity? Abdurrahman Najjar: Be proactive. Cyber threats are evolving rapidly, and cyber hackers are leveraging technology faster than most organizations. By aligning with national regulatory frameworks and working with trusted technology business partner like NXTHOP and their vendors and channels; businesses can stay protected and resilient.

Innovations in OT Security: Positive Technologies paves way for a safer tomorrow
Innovations in OT Security: Positive Technologies paves way for a safer tomorrow

Tahawul Tech

time6 days ago

  • Business
  • Tahawul Tech

Innovations in OT Security: Positive Technologies paves way for a safer tomorrow

Ilya Leonov highlights innovative demonstrations, challenges in securing critical infrastructure, and the UAE's role in building a secure future for global talent and businesses. Ilya Leonov, Regional Director of Positive Technologies, provided valuable insights into the company's groundbreaking contributions to the cybersecurity landscape at GISEC Global 2025 to From showcasing sophisticated attack vectors to focusing on the complexities of securing operational technology (OT) and critical infrastructure, Ilya shared the unique challenges faced by the industry. In this interview, he also discussed the shortage of skilled resources in cybersecurity and the UAE's emerging role as a global hub for talent and secure business environments. Below, we explore his thoughts on the evolving cybersecurity landscape. Interview Excerpts: Can you tell us about some of the innovative things Positive Technologies showcased at GISEC Global 2025 this year? We showcased some very unique technical demonstrations. One of the highlights was a direct memory access attack, where we showed how you can unlock a laptop without knowing the password. It looks like magic, but it's actually quite simple and sophisticated at the same time. Another interesting demonstration is a fault injection attack, where we manipulate the voltage of a motherboard to trick encryption systems and unlock devices. We've received a lot of interest in these sophisticated attack vectors, as not many companies can perform these types of demonstrations. How is your company focusing on OT security this year? This year, we focused heavily on OT (Operational Technology) security, which has become increasingly important, especially with the growing emphasis on critical infrastructure. At GISEC Global, we had a dedicated area for critical infrastructure, and contributing to that was showcasing application security, network security, and monitoring tools that helped identify abnormal activities in the systems. The tools were specifically designed for the unique and complex environments in which critical infrastructure operates. What challenges do you see in securing critical infrastructure and OT systems? Securing critical infrastructure is quite challenging due to a combination of factors. One of the biggest challenges is the legacy systems still in use, such as outdated versions of Windows like XP, which are still running in some industrial environments. This makes it difficult to implement modern security measures. Additionally, the personnel working in OT environments often lack the specialised knowledge required for effective cybersecurity. 'The caliber of professionals needed for critical infrastructure is different from the typical IT security workforce, and this makes securing these systems even more complex.' Is there a gap in the skills and resources available for securing critical infrastructure, and how can this gap be addressed? The shortage of skilled resources is a major pain point in the industry. The gap between the basic knowledge required and the specialised skills needed to protect critical infrastructure is significant. While there are initiatives from governments and private companies to address this gap, there's still a lot of work to be done. The rapid pace of technological advancements, especially in cybersecurity, makes it difficult to keep up. Bridging this gap requires ongoing efforts in upskilling and reskilling talent. Do you believe the UAE has the capacity to attract global talent and create a safer environment for businesses? I believe the UAE is doing an excellent job of creating the right conditions and environment to attract international talent across various fields, not just cybersecurity. If the right conditions are in place, it becomes a winning strategy to build a safer future. Since I've been here, I've seen how the government and the country have been focusing on creating these opportunities for professionals. In the long run, I believe this will yield tremendous results for the country.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store