Daily Guardian UAEDaily Guardian UAE
  • Home
  • UAE
  • What’s On
  • Business
  • World
  • Entertainment
  • Lifestyle
  • Sports
  • Technology
  • Travel
  • Web Stories
  • More
    • Editor’s Picks
    • Press Release
What's On

iOS 27 could boost the battery life of your iPhone

February 15, 2026

Apple’s upcoming low-cost MacBook might get an all-metal kit in fun colors

February 15, 2026

You Asked: TV brightness fatigue, Samsung’s format choices, and the best TV for bright rooms

February 15, 2026

Apple Watch Series 11 hits $299 in a fast-ending deal, a great excuse to finally upgrade

February 15, 2026

This HP Victus gaming laptop deal brings serious specs under $1,000 before Presidents’ Day ends

February 15, 2026
Facebook X (Twitter) Instagram
Finance Pro
Facebook X (Twitter) Instagram
Daily Guardian UAE
Subscribe
  • Home
  • UAE
  • What’s On
  • Business
  • World
  • Entertainment
  • Lifestyle
  • Sports
  • Technology
  • Travel
  • Web Stories
  • More
    • Editor’s Picks
    • Press Release
Daily Guardian UAEDaily Guardian UAE
Home » Why the Middle East needs a result-driven approach to cybersecurity – News
Business

Why the Middle East needs a result-driven approach to cybersecurity – News

By dailyguardian.aeFebruary 1, 20245 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

The Middle East cybersecurity landscape stands out as one of the most dynamically under siege – characterized by various threat traps, a flourishing economy, and extensive digitisation.

Consequently, this has drawn the interest of malicious actors from various parts of the world.

Based on our research, approximately 83% of cyberattacks that were successful in the past 18 months were targeted in nature, highlighting the sophistication with which threat actors can compromise invaluable information belonging to specific companies or groups of individuals.

Why cybercriminals target the Middle East

Firstly, the region’s significant role in oil and gas production and resource transportation makes it an attractive target for cyberattacks on critical infrastructure. This leaves indispensable facilities like oil and gas fields, power plants, ports, and airports vulnerable to cyber threats.

Secondly, geopolitical tensions in the Middle East create an environment conducive to cyberattacks. Well-trained groups of attackers, known as advanced persistent threats (APTs), take advantage of these tensions to execute targeted cyberattacks and engage in cyberespionage activities.

Moreover, the region faces a relevant threat from hacktivist groups – cybercriminals who carry out attacks not for financial gain or data collection, but to draw public attention to social or political issues. These hacktivists employ tactics such as massive Distributed Denial of Service (DDoS) attacks and website defacement to voice their concerns and create an impact on a wider scale.

As a result, massive data leaks increase an attack’s effectiveness through compromised user data, allowing social engineering attacks to campaign with increasing success.

Last year, many big players announced the growth of cyber threats. Any company, regardless of the scale of the business, is at risk: from a large, reputed, industry-forming organization to an SME with a stacked customer data bank, especially ones working as contractors with a large organisation, all have invaluable information at stake. For several years now, there has been a steady trend of attacks on supply chains.

Counterparties of a potential victim will inevitably fall into the field of view of criminals, and consequently, the trend of attacks on supply chains will intensify.

Growing cyber threats are forcing businesses to take a more conscious approach to their protection, making it crucial not only to enhance the information security of data and critical business processes but also to achieve a real result by excluding non-tolerable events.

A conscious approach to result-driven cybersecurity

Now, for a CISO to ensure that the business, the clients, and the partners are all protected, the first step is to test the feasibility of their cybersecurity defences with exercises that simulate real attacks.

During the exercise, one team, called the “blue team,” defends the perimeter, and the other, the “red team,” attacks. A more advanced way is to attract “white” hackers using the bug bounty platform, which will implement invalid events.

This is a complex and multi-tiered task, which is in reality worked out by well-coordinated groups of hackers with a variety of skills and experience. They need to figure out how business processes are built, bypass protection systems, and demonstrate the very act of a non-tolerable event.

Specialists will need to find individual vulnerabilities and investigate and implement their entire chain. This requires skills in finding vulnerabilities in the network and the experience of finding weaknesses in the infrastructure. If a vulnerability is discovered, the participants receive a financial reward.

Reaching a bug bounty on non-tolerable events is the only way for the head of information security (IS) to demonstrate to top management the effectiveness of the built-in protection system. Nevertheless, traditional bug bounty programs, which are aimed at finding vulnerabilities in the systems under study, remain the most popular. Take for example – Qatar telecom operator Ooredoo QPSC who hosted its systems on a Bug Bounty platform, with online clothing retailer Namshi following suit.

Moving to a secured future

A new approach to building effective cybersecurity makes it possible to avoid or prevent non-tolerable events. What is critical to the business is strategically identified and protected first. Accordingly, tools that are focused only on the result are selected. The price of a mistake in this matter is colossal, therefore, stringent requirements are implemented on the qualifications of experts and the tools they use.

Over the past year and a half, cybersecurity experts have accumulated a colossal amount of expertise in the working conditions of massive attacks. Moreover, all the technologies that were developed by the experts, drew this expertise into themselves one way or another. This significantly increased their effectiveness in the context of effective defense, when in the end, only one thing is important – the guaranteed failure of the attack.

The future development of information security systems in the Middle East lies in exploring the wider utility of artificial intelligence to search for and neutralise threats. This is being initiated not only just to address the skill gap, but also by advanced technologies that are already being developed by security vendors.

The writer is director of international business development at Positive Technologies

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Keep Reading

Rabee’s Iraq stock exchange index achieves 8.5% growth in September – News

Middle East crisis derails Bitcoin recovery – News

MAG launches Dh350 million tower at Dubai Sports City – News

Taqa Group successfully prices $1.75 billion dual tranche 7-year and 12-year bond offering – News

UAE-Serbia Cepa set to add $351m to GDP – News

Coinbase to delist some stablecoins in Europe ahead of new regulations – News

Family credit in UAE banking sector hits $115b – News

Boeing, striking union to return to negotiations on Monday – News

Wall St Week Ahead: Investors look to earnings to support record-high stock prices – News

Editors Picks

Apple’s upcoming low-cost MacBook might get an all-metal kit in fun colors

February 15, 2026

You Asked: TV brightness fatigue, Samsung’s format choices, and the best TV for bright rooms

February 15, 2026

Apple Watch Series 11 hits $299 in a fast-ending deal, a great excuse to finally upgrade

February 15, 2026

This HP Victus gaming laptop deal brings serious specs under $1,000 before Presidents’ Day ends

February 15, 2026

Subscribe to News

Get the latest UAE news and updates directly to your inbox.

Latest Posts

The Logitech G29 racing wheel drops to $199.99, and the deal timer is already running

February 15, 2026

Tanishq reinforces long-term UAE commitment; expands footprint with first Dubai South store at Ibn Battuta Mall

February 15, 2026

Sharjah Lights Festival 2026

February 15, 2026
Facebook X (Twitter) Pinterest TikTok Instagram
© 2026 Daily Guardian UAE. All Rights Reserved.
  • Privacy Policy
  • Terms
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.