MANAGEENGINE: PROACTIVE CYBER DEFENCE, A KEY TO NATIONAL SECURITY
Security Advisor Middle East|November 2020
SAREEKA A. G., PRODUCT CONSULTANT, MANAGEENGINE, HIGHLIGHTS WHY GOVERNMENT ORGANISATIONS MUST BE PREPARED TO TACKLE CYBERATTACKS THAT POSE THREAT TO NATIONAL SECURITY AND INTEGRITY.
SAREEKA A. G

Digitisation and advancements in information and communication technology have revolutionised every aspect of modern life. While a connected digital ecosystem that intertwines critical infrastructure provides enormous potential for innovation and development, it also increases the attack surface. The way a country responds to the opportunities and risks that arise in cyberspace plays a crucial role in its growth and security.

Though we all acknowledge the imminent risks cyber attacks pose, are we aware of the scale of impact such attacks can have on a country and its people? Let’s explore the impact as well as who the attackers are, and how they can be stopped.

Who are the attackers and what can they do to a nation?

Based on their motives and scale of attack, cyber attackers can be classified into four groups:

• State sponsored attackers are nonstate individuals or organisations who are discreetly supported by a government entity. These attackers generally operate to fulfill political, commercial or military interests of their country of origin. In today’s world of mutual distrust where nations want to have an upper hand over others, state sponsored cyberattacks have become commonplace. Attackers use a combination of different techniques ranging from spear phishing attempts backed by well-researched social engineering to sophisticated advanced persistent threat (APT) campaigns in order to infiltrate networks and gain access to confidential information such as trade-secrets, research findings, and war strategies to name a few. Cyber espionage and insider attacks (where a trusted insider is paid for carrying out parts of the attack) are also not uncommon. State sponsored attacks have the potential to crumple entire nation-states when the right data is compromised.

• Hacktivists are individuals or groups of individuals who use cyber-attacks as a way of expressing political or ideological extremism.

Numerous cyber-attacks have been carried out in the past as a means of expressing resistance. Launching large scale distributed denial of service (DDoS) attacks to render government servers inaccessible and loading videos and images that criticise a state’s policies on government websites are some of the most common methods hacktivists employ to make their voice heard. While hacktivism appears to be just a form of electronic civil disobedience without malicious intent, taking down networks of organisations that provide essential services such as hospitals can have devastating impact on citizens’ lives.

Continue reading your story on the app

Continue reading your story in the magazine

MORE STORIES FROM SECURITY ADVISOR MIDDLE EASTView All

KASPERSKY SHEDS LIGHT ON THE RANSOMWARE ECOSYSTEM

Ransomware is on the tip of everyone’s tongue every time businesses discuss cyber threats they are likely to face in 2021.

3 mins read
Security Advisor Middle East
May 2021

GAJSHIELD: ENABLING CONTEXTUAL VISIBILITY FOR OPTIMUM DATA PROTECTION

HARRISON ALBERT, REGIONAL DIRECTOR, D-LINK MIDDLE EAST AND AFRICA, TELLS SECURITY ADVISOR MIDDLE EAST HOW GAJSHIELD’S CONTEXT-BASED APPROACH TO SECURITY HELPS ORGANISATIONS FIND ANOMALIES, REDUCE FALSE ALARM AND PREVENT INTENTIONAL & UNINTENTIONAL DATA EXPLOITATION.

3 mins read
Security Advisor Middle East
May 2021

THALES ANNOUNCES NEW SOLUTIONS TO HELP OGANISATIONS DISCOVER, PROTECT AND CONTROL SENSITIVE DATA IN MULTICLOUD ENVIRONMENTS

THALES HAS ANNOUNCED NEW DATA PROTECTION SOLUTIONS FOR GOOGLE CLOUD, MICROSOFT AZURE, AND AMAZON WEB SERVICES, SOLIDIFYING ITS ROLE AS A TRUSTED THIRD PARTY FOR MULTI-CLOUD DATA SECURITY.

3 mins read
Security Advisor Middle East
May 2021

RANSOMWARE RECOVERY COST FOR UAE IN 2021 IS $517,961: SOPHOS SURVEY

THE SURVEY POLLED 5,400 IT DECISION MAKERS IN MID-SIZED ORGANISATIONS IN 30 COUNTRIES ACROSS EUROPE, THE AMERICAS, ASIA-PACIFIC & CENTRAL ASIA, THE MIDDLE EAST, AND AFRICA.

5 mins read
Security Advisor Middle East
May 2021

OVERCOMING THE CYBER-PANDEMIC

ABHIJIT MAHADIK, DIRECTOR, CYBERSECURITY & INFRASTRUCTURE – UAE & KSA, RAQMIYAT SPEAKS TO SAME ABOUT THE EVOLVING CYBERSECURITY LANDSCAPE, THE THREATS ORGANISATIONS NEED TO WATCH OUT FOR AND HOW THE SECURITY PRIORITIES OF ORGANISATIONS HAVE SHIFTED SINCE THE PANDEMIC LAST YEAR.

4 mins read
Security Advisor Middle East
May 2021

FORTINET: MAKING A MARK @ GISEC

ALAIN PENEL, REGIONAL VICE-PRESIDENT, MIDDLE EAST & PAKISTAN AT FORTINET, EXPLAINS WHAT IT MEANS TO BE A PART OF GISEC THIS YEAR AND HOW FORTINET’S CUTTING-EDGE SOLUTIONS CONTINUE TO PROVIDE MAXIMUM PROTECTION AGAINST CYBERTHREATS AND ATTACKS.

4 mins read
Security Advisor Middle East
May 2021

ANATOMY OF AN OT ATTACK

MAHER JADALLAH, SENIOR DIRECTOR - MIDDLE EAST & NORTH AFRICA AT TENABLE, DISCUSSES HOW, INSTEAD OF DEFENDING AGAINST AN ATTACK IN PROGRESS, A MORE SUSTAINABLE APPROACH WOULD BE ONE OF PREVENTION – OF ORGANISATIONS DOING A BETTER JOB OF UNDERSTANDING THEIR SYSTEMS, WHERE AND HOW THOSE SYSTEMS MAY BE EXPOSED, AND PRIORITISING THE THINGS THEY NEED TO PROTECT THESE SYSTEMS.

7 mins read
Security Advisor Middle East
May 2021

MICRO FOCUS: OFFERING DRAMA-FREE IT WITH OPTIC

TOUFIC DERBASS, MANAGING DIRECTOR MICRO FOCUS MIDDLE EAST & AFRICA, DISCUSSES HOW THE LATEST IT PLATFORM FROM MICRO FOCUS OFFERS UNIFIED INTERFACE AND & EXPANDED INTEGRATION CAPABILITIES.

2 mins read
Security Advisor Middle East
May 2021

COPING WITH THE NEW NORMAL

HUSNI HAMMOUD, MANAGING DIRECTOR - ESET ME, BARRACUDA NETWORKS, IVANTI (PART OF MIDIS GROUP), TELLS SECURITY ADVISOR HOW THE CHALLENGES OF THE LAST ONE YEAR HAVE CHANGED THE BUSINESS LANDSCAPE AND HOW ORGANISATIONS ARE NAVIGATING NEW TRENDS.

3 mins read
Security Advisor Middle East
May 2021

AN IN-DEPTH DEFENCE STRATEGY

WERNO GEVERS, REGIONAL MANAGER, MIMECAST MIDDLE EAST, DISCUSSES HOW WHEN IT COMES TO EMAIL SECURITY, IT IS NECESSARY FOR SECURITY PROFESSIONALS TO EVOLVE FROM A PERIMETER-BASED DISCIPLINE TO A MORE PERVASIVE ONE.

4 mins read
Security Advisor Middle East
May 2021
RELATED STORIES

The future of PSUs is here: Intel's ATX 3.0 powers monster 600W graphics cards

A new 12+4-pin power connection for PCIe 5 cards delivers up to 600 watts on one rail.

2 mins read
PCWorld
May 2022

Acer Swift 3: A Big Screen on a Modest Budget

The Swift 3 is the perfect laptop for writers and students.

10+ mins read
PCWorld
May 2022

La era de la neuroprivacidad

Puede sonar a ciencia ficción, pero ya se puede leer el pensamiento y estamos a un paso de influir en él, gracias a los avances en neurotecnología. Pronto, los datos no provendrán de las redes sociales o nuestras búsquedas en Internet: se recogerán directamente de nuestro cerebro. Y mientras las grandes empresas se frotan las manos, los científicos advierten que ya es la hora de regular. Legislemos los neuroderechos.

10+ mins read
Muy Interesante España
Mayo 2022

Asus ROG Strix Scar 17 (G733): First-Class Gaming

A cinematic experience from a bruiser of a laptop

9 mins read
PC Magazine
May 2022

Now that Mac Studio is here, the iMac can finally be its fun self again

The iMac gets to be fun again and power users get a pro Mac they can afford.

3 mins read
Macworld
May 2022

MINI MEDIA MASTERPIECE

A shelf-sized home theater and couch gaming machine? You can count us in

10+ mins read
Maximum PC
May 2022

How to run your favorite iPhone and iPad apps on an M1 Mac

Expand your app library by adding apps you typically use on an iPhone or iPad.

3 mins read
Macworld
April 2022

RISE OF THE CHROMEBOOK

Are Chromebooks the revolution the laptop space needs or will Windows emerge triumphant? Christian Guyton explores

10+ mins read
Maximum PC
April 2022

HP Chromebase 22

Rotation before procrastination

3 mins read
Maximum PC
April 2022

MAC VS PC FOREVER FRENEMIES

The PC and Mac have been rivals for nearly 40 years, yet the Mac has never had the measure of the PC. Could the arrival of Apple silicon finally give the Mac the edge? Jeremy Laird investigates…

10+ mins read
Maximum PC
April 2022