Digitisation and advancements in information and communication technology have revolutionised every aspect of modern life. While a connected digital ecosystem that intertwines critical infrastructure provides enormous potential for innovation and development, it also increases the attack surface. The way a country responds to the opportunities and risks that arise in cyberspace plays a crucial role in its growth and security.
Though we all acknowledge the imminent risks cyber attacks pose, are we aware of the scale of impact such attacks can have on a country and its people? Let’s explore the impact as well as who the attackers are, and how they can be stopped.
Who are the attackers and what can they do to a nation?
Based on their motives and scale of attack, cyber attackers can be classified into four groups:
• State sponsored attackers are nonstate individuals or organisations who are discreetly supported by a government entity. These attackers generally operate to fulfill political, commercial or military interests of their country of origin. In today’s world of mutual distrust where nations want to have an upper hand over others, state sponsored cyberattacks have become commonplace. Attackers use a combination of different techniques ranging from spear phishing attempts backed by well-researched social engineering to sophisticated advanced persistent threat (APT) campaigns in order to infiltrate networks and gain access to confidential information such as trade-secrets, research findings, and war strategies to name a few. Cyber espionage and insider attacks (where a trusted insider is paid for carrying out parts of the attack) are also not uncommon. State sponsored attacks have the potential to crumple entire nation-states when the right data is compromised.
• Hacktivists are individuals or groups of individuals who use cyber-attacks as a way of expressing political or ideological extremism.
Numerous cyber-attacks have been carried out in the past as a means of expressing resistance. Launching large scale distributed denial of service (DDoS) attacks to render government servers inaccessible and loading videos and images that criticise a state’s policies on government websites are some of the most common methods hacktivists employ to make their voice heard. While hacktivism appears to be just a form of electronic civil disobedience without malicious intent, taking down networks of organisations that provide essential services such as hospitals can have devastating impact on citizens’ lives.
Continue reading your story on the app
Continue reading your story in the magazine
KASPERSKY SHEDS LIGHT ON THE RANSOMWARE ECOSYSTEM
Ransomware is on the tip of everyone’s tongue every time businesses discuss cyber threats they are likely to face in 2021.
GAJSHIELD: ENABLING CONTEXTUAL VISIBILITY FOR OPTIMUM DATA PROTECTION
HARRISON ALBERT, REGIONAL DIRECTOR, D-LINK MIDDLE EAST AND AFRICA, TELLS SECURITY ADVISOR MIDDLE EAST HOW GAJSHIELD’S CONTEXT-BASED APPROACH TO SECURITY HELPS ORGANISATIONS FIND ANOMALIES, REDUCE FALSE ALARM AND PREVENT INTENTIONAL & UNINTENTIONAL DATA EXPLOITATION.
THALES ANNOUNCES NEW SOLUTIONS TO HELP OGANISATIONS DISCOVER, PROTECT AND CONTROL SENSITIVE DATA IN MULTICLOUD ENVIRONMENTS
THALES HAS ANNOUNCED NEW DATA PROTECTION SOLUTIONS FOR GOOGLE CLOUD, MICROSOFT AZURE, AND AMAZON WEB SERVICES, SOLIDIFYING ITS ROLE AS A TRUSTED THIRD PARTY FOR MULTI-CLOUD DATA SECURITY.
RANSOMWARE RECOVERY COST FOR UAE IN 2021 IS $517,961: SOPHOS SURVEY
THE SURVEY POLLED 5,400 IT DECISION MAKERS IN MID-SIZED ORGANISATIONS IN 30 COUNTRIES ACROSS EUROPE, THE AMERICAS, ASIA-PACIFIC & CENTRAL ASIA, THE MIDDLE EAST, AND AFRICA.
OVERCOMING THE CYBER-PANDEMIC
ABHIJIT MAHADIK, DIRECTOR, CYBERSECURITY & INFRASTRUCTURE – UAE & KSA, RAQMIYAT SPEAKS TO SAME ABOUT THE EVOLVING CYBERSECURITY LANDSCAPE, THE THREATS ORGANISATIONS NEED TO WATCH OUT FOR AND HOW THE SECURITY PRIORITIES OF ORGANISATIONS HAVE SHIFTED SINCE THE PANDEMIC LAST YEAR.
FORTINET: MAKING A MARK @ GISEC
ALAIN PENEL, REGIONAL VICE-PRESIDENT, MIDDLE EAST & PAKISTAN AT FORTINET, EXPLAINS WHAT IT MEANS TO BE A PART OF GISEC THIS YEAR AND HOW FORTINET’S CUTTING-EDGE SOLUTIONS CONTINUE TO PROVIDE MAXIMUM PROTECTION AGAINST CYBERTHREATS AND ATTACKS.
ANATOMY OF AN OT ATTACK
MAHER JADALLAH, SENIOR DIRECTOR - MIDDLE EAST & NORTH AFRICA AT TENABLE, DISCUSSES HOW, INSTEAD OF DEFENDING AGAINST AN ATTACK IN PROGRESS, A MORE SUSTAINABLE APPROACH WOULD BE ONE OF PREVENTION – OF ORGANISATIONS DOING A BETTER JOB OF UNDERSTANDING THEIR SYSTEMS, WHERE AND HOW THOSE SYSTEMS MAY BE EXPOSED, AND PRIORITISING THE THINGS THEY NEED TO PROTECT THESE SYSTEMS.
MICRO FOCUS: OFFERING DRAMA-FREE IT WITH OPTIC
TOUFIC DERBASS, MANAGING DIRECTOR MICRO FOCUS MIDDLE EAST & AFRICA, DISCUSSES HOW THE LATEST IT PLATFORM FROM MICRO FOCUS OFFERS UNIFIED INTERFACE AND & EXPANDED INTEGRATION CAPABILITIES.
COPING WITH THE NEW NORMAL
HUSNI HAMMOUD, MANAGING DIRECTOR - ESET ME, BARRACUDA NETWORKS, IVANTI (PART OF MIDIS GROUP), TELLS SECURITY ADVISOR HOW THE CHALLENGES OF THE LAST ONE YEAR HAVE CHANGED THE BUSINESS LANDSCAPE AND HOW ORGANISATIONS ARE NAVIGATING NEW TRENDS.
AN IN-DEPTH DEFENCE STRATEGY
WERNO GEVERS, REGIONAL MANAGER, MIMECAST MIDDLE EAST, DISCUSSES HOW WHEN IT COMES TO EMAIL SECURITY, IT IS NECESSARY FOR SECURITY PROFESSIONALS TO EVOLVE FROM A PERIMETER-BASED DISCIPLINE TO A MORE PERVASIVE ONE.
The future of PSUs is here: Intel's ATX 3.0 powers monster 600W graphics cards
A new 12+4-pin power connection for PCIe 5 cards delivers up to 600 watts on one rail.
Acer Swift 3: A Big Screen on a Modest Budget
The Swift 3 is the perfect laptop for writers and students.
La era de la neuroprivacidad
Puede sonar a ciencia ficción, pero ya se puede leer el pensamiento y estamos a un paso de influir en él, gracias a los avances en neurotecnología. Pronto, los datos no provendrán de las redes sociales o nuestras búsquedas en Internet: se recogerán directamente de nuestro cerebro. Y mientras las grandes empresas se frotan las manos, los científicos advierten que ya es la hora de regular. Legislemos los neuroderechos.
Asus ROG Strix Scar 17 (G733): First-Class Gaming
A cinematic experience from a bruiser of a laptop
Now that Mac Studio is here, the iMac can finally be its fun self again
The iMac gets to be fun again and power users get a pro Mac they can afford.
MINI MEDIA MASTERPIECE
A shelf-sized home theater and couch gaming machine? You can count us in
How to run your favorite iPhone and iPad apps on an M1 Mac
Expand your app library by adding apps you typically use on an iPhone or iPad.
RISE OF THE CHROMEBOOK
Are Chromebooks the revolution the laptop space needs or will Windows emerge triumphant? Christian Guyton explores
HP Chromebase 22
Rotation before procrastination
MAC VS PC FOREVER FRENEMIES
The PC and Mac have been rivals for nearly 40 years, yet the Mac has never had the measure of the PC. Could the arrival of Apple silicon finally give the Mac the edge? Jeremy Laird investigates…