• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Webinars
      • AI in Finance
      • The Resilient Enterprise
    • CXO50 Oman
    • CXO50
      • 2026
      • 2025
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
      • 2026
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
    • Cloud Connect 2025
    • All events
  • Digital Magazine
  • GITEX x AI EVERYTHING
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Webinars
      • AI in Finance
      • The Resilient Enterprise
    • CXO50 Oman
    • CXO50
      • 2026
      • 2025
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
      • 2026
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
    • Cloud Connect 2025
    • All events
  • Digital Magazine
  • GITEX x AI EVERYTHING
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

A proactive prevention strategy

by CXO Staff
March 23, 2022
in News
A proactive prevention strategy

What are you showcasing at GISEC?

At GISEC, we are showcasing all of our product lines. Today, you see fifth-generation attacks across networks, cloud, and endpoints. Our main focus is our Infinity architecture, which offers protection against these threat vectors and simplifies security management.

Infinity architecture is based on two primary principles. The first one is that we do prevention. Infinity platform is powered by our cyber threat intelligence database, which correlates data from our customers. Our top priority is to ensure that we don’t block real traffic and create false positives. We want our customers to use this platform to stop the attacks, not just see something has happened. The second one is to be a holistic solution. We don’t believe in point solutions but an integrated threat prevention platform that can protect the entire IT infrastructure of our customers and help them stay ahead of threat actors.

What has been the impact of this pandemic on the threat landscape?

It has gotten worse. Our 2022 security report revealed that organisations experienced a 50 percent increase in weekly cyber-attacks last year. It is because these attacks are more successful and lucrative. We have also seen evolving attacks on mobile devices, major cloud services vulnerabilities, and supply chain attacks.

The move to remote and hybrid work has expanded the attack surface because employees now connect from everywhere. Because this transition was done so fast, no one had time to think about security. As a result, threat actors are growing in confidence and sophistication.

What kind of key attack vectors and techniques do you see now?

One of the most prevalent vulnerabilities is remote code execution. We also see many DDoS attacks. But, the most interesting thing is the rise in the number of ransomware attacks, which cost its victims millions of dollars and stolen data. Especially in the past year, we have seen the emergence of a large number of ransomware and wipers, which are ransomware without a key, targeted at critical infrastructure, leading to massive disruption of day-to-day lives and posing grievous harm to physical security.

Have there been any nation-state attacks against critical infrastructure in the Middle East?

There have been some of them, but we don’t really know whether these are nation-states or cybercriminals. Some of these attacks were attributed to cyber-criminal gangs like in the case of the Colonial Pipeline attack in the US. But there are others like the attacks on railways and gas stations in Iran, for which no one has claimed to be responsible. So it could be external or internal. We see more and more of these types of attacks, and they could come from anywhere. It is true nation-states are using ransomware more than ever before, and sometimes they do it to extort money. However, the good news is that governments and law enforcement agencies worldwide are cracking down on these ransomware groups.

 

 

 

 

 

Tags: Check Point SoftwareCybersecurityGISEC
ShareTweet

Related Posts

Resilience in motion: Zain Group on navigating risk and maintaining momentum
Feature

Resilience in motion: Zain Group on navigating risk and maintaining momentum

May 22, 2026

As telecom networks become the backbone of digital economies, risk is no longer something organisations can isolate or defer. AbdulGhaffar...

Nutanix to empower Neoclouds to deliver higher value AI services
Future

ManageEngine rolls out autonomous AI capabilities across its suite

May 22, 2026

ManageEngine, a division of Zoho Corporation, announced the rollout of Zia Agents, the company's proprietary AI-powered autonomous agent, across its...

Discussion about this post

Latest Issue

Resilience in motion: Zain Group on navigating risk and maintaining momentum

Resilience in motion: Zain Group on navigating risk and maintaining momentum

May 22, 2026
Nutanix to empower Neoclouds to deliver higher value AI services

ManageEngine rolls out autonomous AI capabilities across its suite

May 22, 2026
Beyond compliance: From paper policies to real-time proof

Beyond compliance: From paper policies to real-time proof

May 22, 2026

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy
© 2025 – CXO Insight Middle East. All Rights Reserved.
Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Webinars
    • CX50 Oman
    • CXO50
      • 2026
      • 2025
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
      • 2026
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
    • Cloud Connect 2025
    • All events
  • Videos
  • GITEX x AI Everything
  • Digital Magazine

© 2025 - CXO Insight Middle East. All Rights Reserved.