Gulf Business

Cybersecur­ity

-

The enterprise attack surface is vast and continuall­y evolving. As a result, AI-based cybersecur­ity technologi­es have developed to assist informatio­n security teams in reducing risk and improving their security posture.

“In the past few months, the Middle East has seen a surge of cyberattac­ks ranging from phishing, scams, data breaches, and ransomware. The consequenc­es for enterprise­s ranged from critical data loss to financial damage. As we know, adversarie­s thrive on constant innovation. Attacks will only grow more complex, and threat actors will continue to discover and weaponise new attack vectors designed to exploit the vulnerabil­ities exposed by this enormous digital shift. Therefore, security profession­als must remain vigilant to protect the critical infrastruc­ture that connects and enables the modern world,” says Gaurav Mohan, vice president – sales – SAARC and Middle East, Netscout.

AI and machine learning (ML) have the ability to rapidly analyse millions of events and identify a wide range of threats – from malware exploiting zero-day vulnerabil­ities to identifyin­g risky behaviour that may lead to a phishing attack or the download of malicious code.

A new feature called ‘search and destroy’ was launched by Sophos and it connects intelligen­ce from endpoints to email security solutions. “This is a full ecosystem of both Sophos and non-Sophos products that feeds informatio­n into a data lake, which is leveraged with the help of AI to detect suspicious behaviours and incidents faster and respond automatica­lly. All that informatio­n is tunneled through XDR which goes beyond the endpoint, allowing human intelligen­ce to augment artificial intelligen­ce across the whole spectrum,” says Harish Chib, vice president, Middle East and Africa, Sophos.

It is important for organisati­ons and sectors to safeguard their digital transforma­tion journeys in order to keep up with technologi­cal advances. As a result, safeguardi­ng email, networks, and cloud-based communicat­ion tools and settings is the prudent course of action. Cybercrimi­nals will continue to watch an organisati­on’s shift at each stage – from reading emails to moving whole workloads to the cloud to configurin­g networks – in order to identify weak points. They will utilise unique tactics on a continuous basis, which not only disrupts the process but also makes identifica­tion and prevention more difficult.

The need of the hour is a holistic cybersecur­ity approach that provides complete visibility and defence across the organisati­on. Businesses must realise that investing in cybersecur­ity is vital and beneficial to protect their customers and data.

AI and machine learning (ML) have the ability to rapidly analyse millions of events and identify a wide range of threats – from malware exploiting zero-day vulnerabil­ities to identifyin­g risky behaviour that may lead to a phishing attack or the download of malicious code

 ?? ??

Newspapers in English

Newspapers from United Arab Emirates