logo
#

Latest news with #criticalinfrastructure

Nozomi strengthens global and regional defenses against rising infrastructure cyber threats
Nozomi strengthens global and regional defenses against rising infrastructure cyber threats

Tahawul Tech

time6 days ago

  • Business
  • Tahawul Tech

Nozomi strengthens global and regional defenses against rising infrastructure cyber threats

Edgard Capdevielle, CEO of Nozomi Networks, shares pressing global and regional insights on the evolution of cyber threats, AI's dual role in defense and offense, and the urgent need to secure operational technologies across sectors, with Interview Excerpts What has been the most significant shift in cyber threats targeting critical infrastructure globally over the past 12 to 18 months, and how has AI evolved in both offensive and defensive strategies? Cyber threats targeting critical infrastructure have become increasingly sophisticated and relentless. Global tensions and geopolitical conflicts often coincide with a surge in cyber activity—ransomware, for example, has grown rampant. AI plays a central role in both attack and defense. Threat actors leverage AI for reconnaissance, social engineering, and code development, while defenders are integrating AI to detect anomalies, enhance visibility, and respond to threats. At Nozomi Networks, our entire platform was built at the intersection of AI and OT security, enabling advanced protection for industrial systems What advanced attack tactics are you observing, and how can infrastructure operators defend against these emerging threats? One major development is the increasing exploitation of the wireless attack surface, particularly in OT and IoT environments. Attackers can now access systems remotely, even from outside facilities like parking lots. Additionally, 'living off the land' attacks—where threat actors exploit legitimate system tools—are hard to detect. Criminals and nation-state actors use AI to craft zero-day exploits and personalized phishing attempts. To counter these threats, we've introduced wireless sensors to broaden visibility and defense. What are the top three emerging threats that critical infrastructure operators need to prepare for, and how can AI help mitigate these risks? Ransomware: It has leveled the playing field, making even non-financial sectors prime targets. Wireless Attacks: Wireless infrastructure can now be exploited externally, bypassing traditional firewall defenses. AI-driven Threats: AI enables highly targeted and automated attacks. 'AI helps mitigate these risks by enhancing real-time monitoring, predictive analytics, and adaptive threat response across sectors including energy, tourism, and manufacturing.' How have regional challenges in the Middle East and Africa impacted the cybersecurity posture of critical infrastructure? Are there specific sectors at heightened risk? The GCC region's dependence on critical sectors like oil, gas, water, and energy, combined with ongoing digital transformation and IT-OT convergence, has expanded the attack surface. There's an influx of both cyber criminals and nation-state actors. While the region is advancing in cybersecurity maturity, challenges persist due to legacy OT systems interacting with modern IT, often with inadequate protection. What role do regional regulations and cybersecurity frameworks play in securing critical infrastructure, and how can these be improved? Regulatory bodies across the GCC are becoming more proactive. The UAE's National Cybersecurity Strategy and Saudi Arabia's ECC framework under the NCA are setting foundational standards. Cross-country cooperation is also growing. However, regulations should go beyond compliance and push for proactive risk management. The focus must shift from incident response to predictive protection, supported by a shared risk language across sectors. Is there a gap between the sophistication of cyber threats and the preparedness of critical infrastructure operators in this region? How can this gap be addressed? For years, financial and retail industries evolved in lockstep with cybercriminals, while critical infrastructure lagged behind. Operators now face nation-state-grade threats without the legacy of security investment or practices. Bridging this gap requires not just technical upgrades but cultural and budgetary shifts—security must become embedded into every layer of operations.

Innovations in OT Security: Positive Technologies paves way for a safer tomorrow
Innovations in OT Security: Positive Technologies paves way for a safer tomorrow

Tahawul Tech

time6 days ago

  • Business
  • Tahawul Tech

Innovations in OT Security: Positive Technologies paves way for a safer tomorrow

Ilya Leonov highlights innovative demonstrations, challenges in securing critical infrastructure, and the UAE's role in building a secure future for global talent and businesses. Ilya Leonov, Regional Director of Positive Technologies, provided valuable insights into the company's groundbreaking contributions to the cybersecurity landscape at GISEC Global 2025 to From showcasing sophisticated attack vectors to focusing on the complexities of securing operational technology (OT) and critical infrastructure, Ilya shared the unique challenges faced by the industry. In this interview, he also discussed the shortage of skilled resources in cybersecurity and the UAE's emerging role as a global hub for talent and secure business environments. Below, we explore his thoughts on the evolving cybersecurity landscape. Interview Excerpts: Can you tell us about some of the innovative things Positive Technologies showcased at GISEC Global 2025 this year? We showcased some very unique technical demonstrations. One of the highlights was a direct memory access attack, where we showed how you can unlock a laptop without knowing the password. It looks like magic, but it's actually quite simple and sophisticated at the same time. Another interesting demonstration is a fault injection attack, where we manipulate the voltage of a motherboard to trick encryption systems and unlock devices. We've received a lot of interest in these sophisticated attack vectors, as not many companies can perform these types of demonstrations. How is your company focusing on OT security this year? This year, we focused heavily on OT (Operational Technology) security, which has become increasingly important, especially with the growing emphasis on critical infrastructure. At GISEC Global, we had a dedicated area for critical infrastructure, and contributing to that was showcasing application security, network security, and monitoring tools that helped identify abnormal activities in the systems. The tools were specifically designed for the unique and complex environments in which critical infrastructure operates. What challenges do you see in securing critical infrastructure and OT systems? Securing critical infrastructure is quite challenging due to a combination of factors. One of the biggest challenges is the legacy systems still in use, such as outdated versions of Windows like XP, which are still running in some industrial environments. This makes it difficult to implement modern security measures. Additionally, the personnel working in OT environments often lack the specialised knowledge required for effective cybersecurity. 'The caliber of professionals needed for critical infrastructure is different from the typical IT security workforce, and this makes securing these systems even more complex.' Is there a gap in the skills and resources available for securing critical infrastructure, and how can this gap be addressed? The shortage of skilled resources is a major pain point in the industry. The gap between the basic knowledge required and the specialised skills needed to protect critical infrastructure is significant. While there are initiatives from governments and private companies to address this gap, there's still a lot of work to be done. The rapid pace of technological advancements, especially in cybersecurity, makes it difficult to keep up. Bridging this gap requires ongoing efforts in upskilling and reskilling talent. Do you believe the UAE has the capacity to attract global talent and create a safer environment for businesses? I believe the UAE is doing an excellent job of creating the right conditions and environment to attract international talent across various fields, not just cybersecurity. If the right conditions are in place, it becomes a winning strategy to build a safer future. Since I've been here, I've seen how the government and the country have been focusing on creating these opportunities for professionals. In the long run, I believe this will yield tremendous results for the country.

Unexplained components found in Denmark's energy equipment imports, industry group says
Unexplained components found in Denmark's energy equipment imports, industry group says

Reuters

time21-05-2025

  • Politics
  • Reuters

Unexplained components found in Denmark's energy equipment imports, industry group says

COPENHAGEN, May 21 (Reuters) - Unexplained electronic components have been found in imported equipment for Denmark's energy supply network, industry group Green Power Denmark said on Wednesday, adding that an investigation was underway to learn more. The findings coincide with an increased focus internationally on potential security vulnerabilities in critical infrastructure such as energy grids. "It concerns printed circuit boards that were supposed to be part of components for the energy supply," Jorgen Christensen, technical director at Green Power Denmark, told Reuters. "We don't know how critical it is or whether there are bad intentions behind it," he said. The Danish ministry for preparedness and resilience declined to comment on whether an investigation had been started. The justice ministry, energy ministry and the intelligence service did not reply to Reuters' requests for comment. Christensen declined to specify which country the equipment originated from, who was conducting the investigation or to elaborate on the components' capabilities, including whether they were meant for solar power equipment. "This is highly concerning. It is important that an investigation is underway," Walburga Hemetsberger, CEO of solar lobby SolarPower Europe, told Reuters on Wednesday. Christensen said the components were discovered recently during a routine examination of circuit boards that were due to be installed in energy supply equipment. The circuit boards might have been designed for multiple purposes, which could explain the presence of additional components, but Christensen emphasised they should not be included in equipment destined for energy infrastructure. "It's possible the supplier had no malicious intent. We can't say at this point, but that doesn't change the fact that these components shouldn't be there," he said. The findings were first reported by Danish news outlet Berlingske earlier on Wednesday. Reuters last week reported that U.S. energy officials found rogue communication devices in Chinese-made solar inverters and batteries that could potentially bypass firewalls and destabilise power grids.

Cynalytica pioneers cybersecurity solutions for critical infrastructure protection
Cynalytica pioneers cybersecurity solutions for critical infrastructure protection

Tahawul Tech

time20-05-2025

  • Business
  • Tahawul Tech

Cynalytica pioneers cybersecurity solutions for critical infrastructure protection

The company's groundbreaking platform provides passive, real-time monitoring for industrial control systems, addressing deep-rooted cybersecurity blind spots in critical infrastructure. Cynalytica, a US-based cybersecurity company, is at the forefront of protecting critical infrastructure with its innovative approach to securing industrial control systems (ICS) and SCADA environments. Led by CEO Richard Robinson, the company has introduced a groundbreaking platform that provides passive, real-time visibility across a wide range of control system communications, including analog, serial, and IP/Ethernet. The solution ensures comprehensive monitoring from Level 0 to Level 3 without disrupting operations. Robinson's vision has positioned Cynalytica as one of the few companies capable of addressing deep-rooted blind spots in critical infrastructure cybersecurity, setting a new standard for protection in the industry. Robinson spoke to during his visit to Dubai at GISEC Global 2025. He said: 'Our primary focus has always been on education and raising awareness within the technology space, particularly as it relates to the protection of critical infrastructure. Several years ago, we founded our company with a specific purpose: to address a neglected segment of critical infrastructure that had been overlooked globally.' He highlighted that the key issue is that, prior to the internet, essential infrastructure such as water, transportation, and power relied on non-IP-based legacy communications. With the advent of the internet, the cybersecurity landscape has evolved, especially within industrial control systems. However, most cybersecurity companies focused solely on IP or Ethernet-based communications, overlooking the majority of critical infrastructure that remains non-IP-based. This gap still exists today. 'The impetus for founding this company was rooted in the Stuxnet incident, which is considered the first significant industrial control cybersecurity event. Stuxnet specifically targeted non-IP-based critical infrastructure components, highlighting a serious vulnerability in the industry. At the time, no technical solution existed to monitor these non-IP communications safely, and the challenge was clear: a new platform and technology had to be developed,' he added. 'Unlike Ethernet-based systems, protecting non-IP communications required a different approach. While most companies avoided addressing this issue, our team—driven by expertise in this area—took on the challenge. Over the past seven to eight years, we have focused on developing solutions for this exact problem.' Cynalytica's primary customers to date have been the US government, mainly within the Department of Defense, who are acutely aware of the critical infrastructure systems that operate outside traditional IP networks and require protection beyond internet-based cybersecurity tools. 'More recently, we have seen growing recognition within the industry that significant portions of critical infrastructure are not being adequately monitored, and that viable solutions are now available. Many professionals in the OT and industrial control spaces remain unaware that solutions to protect non-IP infrastructure exist. This is why we are actively engaging with industry stakeholders to raise awareness. It is gratifying to see that our efforts are gaining traction,' said Robinson. Cynalytica announced a strategic partnership with PwC Middle East, a development that marks significant recognition by a major global company in this field, validating the need for technological innovation in this area. Jessica Ohnona, Executive Vice President of Data Science at Cynalytica, leads the development of machine learning and AI technologies that provide deep visibility into serial, analog, and hybrid OT environments—areas often overlooked by traditional security tools. Ohnona has been central to the company's growth strategy, product innovation, and market expansion across the US, the Middle East, and Europe. Ohnona's work helps critical infrastructure operators strengthen cyber resilience without disrupting operations, while giving security stakeholders and investors' confidence in scalable, future-proof solutions. Ohnona said: 'At GISEC 2025, Cynalytica showcased how we're redefining visibility in OT cybersecurity—bringing real-time, passive monitoring to the deep layers of critical infrastructure that traditional tools overlook. As cyber-physical threats grow more sophisticated, especially across legacy and hybrid environments, this level of insight is no longer a luxury—it's essential. Together with PwC Middle East, we're accelerating resilience and delivering the operational assurance that infrastructure operators across the region—and the world—urgently need.'

Kaspersky's Cyber Immunity protects critical infrastructure, shapes the future of security
Kaspersky's Cyber Immunity protects critical infrastructure, shapes the future of security

Tahawul Tech

time15-05-2025

  • Business
  • Tahawul Tech

Kaspersky's Cyber Immunity protects critical infrastructure, shapes the future of security

Toufic Derbass, Managing Director for the Middle East, Türkiye, and Africa at Kaspersky, sheds light on the challenges of securing critical sectors and the company's pioneering Cyber Immunity approach. Cybersecurity threats are evolving at a rapid pace, and industries such as utilities, oil and gas, and manufacturing are increasingly exposed due to outdated systems. Kaspersky, a global cybersecurity and digital privacy company, is responding to these vulnerabilities with innovative solutions, spearheading a movement toward Cyber Immunity. Toufic Derbass, Managing Director for the Middle East, Türkiye, and Africa, discusses with at GISEC Global 2025, how the company is tackling the unique challenges facing critical infrastructure sectors, the transformative role of AI in cybersecurity, and the shift from traditional security measures to proactive, unhackable systems. Derbass also explores Kaspersky's leadership in defining the future of cybersecurity through its vision of Cyber Immunity. Interview Excerpts: Why industrial sectors like utilities, oil and gas, and manufacturing are more vulnerable to cyberattacks, and how Kaspersky is addressing these challenges? Critical infrastructure, such as utilities, oil and gas, and manufacturing, often lags behind traditional IT environments in terms of cybersecurity maturity. Industries are more vulnerable because they typically rely on older, less secure systems that weren't designed with modern cybersecurity threats in mind. For example, in the Middle East, we see that about 38% of devices in the industrial sector have been compromised. At Kaspersky, we focus on providing a full portfolio that covers both endpoint and network protection for these sectors. Additionally, we offer dedicated threat intelligence and we're the only company that has a dedicated team operating the world's only CERT for industrial cybersecurity, which allows us to provide specialised support to address these unique challenges. Can you explain Kaspersky's concept of 'Cyber Immunity'? How does it contrast with conventional cybersecurity approaches? Cyber Immunity goes beyond traditional cybersecurity. While cybersecurity is about detecting and mitigating risks, Cyber Immunity aims to make systems completely unhackable. This vision is about building secure technology by design, ensuring that devices are inherently secure and resistant to cyberattacks. Kaspersky's goal is to move beyond the ongoing cycle of attacks and defenses. For instance, we've developed Cyber–Immune thin clients and applications that are secure by design, even in the face of AI-driven threats. This methodology ensures that systems remain resilient, even in highly vulnerable environments like banking or telecommunications. It's a transformative approach, and while we're still in the early stages, we are leading the way in executing this vision. Could you share your thoughts on how AI is changing the landscape of cyber threats, and how Kaspersky is utilising AI to stay ahead of these threats? AI is a double-edged sword in the world of cybersecurity. On the one hand, cybercriminals are leveraging AI to automate and scale their attacks, creating highly credible phishing campaigns and malicious files. In fact, at Kaspersky, we identify around close to 500,000 new malicious files per day, a number that would be impossible to handle manually. On the other hand, we've been using AI and machine learning for over 20 years, long before AI became a buzzword. Our solutions utilise AI to predict and stop threats in real time, analysing vast amounts of data to detect anomalies and respond quickly. 'AI allows us to manage the sheer volume of attacks and ensure that our systems are continuously evolving to meet new challenges.' You've mentioned that some cyberattacks on critical infrastructure have escalated to the level of cyber warfare, with real-world consequences. How can organisations prevent such catastrophic events from occurring? Cyberattacks on critical infrastructure can indeed have devastating real-world consequences, such as explosions or system failures that disrupt entire industries or nations. Prevention starts with a proactive approach. Organisations must prioritise cybersecurity in their industrial environments, especially since many of these sectors are still catching up in terms of security measures. At Kaspersky, we emphasise the need for robust defense systems that not only detect but also prevent attacks before they can cause harm. We also stress the importance of collaboration between vendors, regulators, and other stakeholders to create a unified front against such advanced threats. By addressing cybersecurity at the design level, we can create more resilient systems that are capable of withstanding even the most sophisticated attacks. Kaspersky has pioneered the development of Cyber Immunity. Could you discuss how this vision is being executed and how it's impacting the cybersecurity industry? Cyber Immunity is a long-term vision, and we are already taking steps to execute it. We've introduced Cyber-Immune products such as thin clients and an ecosystem of secure applications that provide a higher level of protection than traditional cybersecurity measures. This shift is gradually transforming the cybersecurity landscape, as we move from a reactive to a proactive stance, where systems are inherently immune to cyber threats. While we are still in the early stages of this transformation, especially in regions like Asia Pacific and the Middle East, we are leading the charge in creating these solutions. It's a game-changer, and it's changing how we think about security, moving us toward a future where attacks are no longer inevitable but preventable.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store