Close Menu
Edu Expertise Hub
    Facebook X (Twitter) Instagram
    Monday, July 7
    • About us
    • Contact
    • Submit Coupon
    Facebook X (Twitter) Instagram YouTube
    Edu Expertise Hub
    • Home
    • Udemy Coupons
    • Best Online Courses and Software Tools
      • Business & Investment
      • Computers & Internet
      • eBusiness and eMarketing
    • Reviews
    • Jobs
    • Latest News
    • Blog
    • Videos
    Edu Expertise Hub
    Home » Latest News » Corporate cover-up behind world-beating cyber security record in Middle East
    Latest News

    Corporate cover-up behind world-beating cyber security record in Middle East

    TeamBy TeamJanuary 4, 2025No Comments6 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Corporate cover-up behind world-beating cyber security record in Middle East
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Only two of the top 100 listed companies in the Middle East reported cyber security incidents last year, according to defence vulnerability scanning firm SecurityScorecard, but most incidents in the region went unreported, it said. 

    SecurityScorecard’s findings highlighted an impressive record in the Middle East and North Africa (MENA) when compared with Europe, where 18 of the top 100 firms had security breaches, and to the US, where 21% of firms in the S&P 500 stock market index were hit. 

    Gulf states in particular have invested heavily in cyber security to deter rampant attacks in the region as they transform from central, state-controlled petro-states to diverse economies more dependent on vulnerable information communications. But experts said it still lagged EU and US in laws required to guarantee open reporting deemed necessary for resilience. 

    Ryan Sherstobitoff, vice-president of research at SecurityScorecard, said he believed most security breaches that large MENA corporations suffered last year went unreported. 

    “I would say probably 80% is not reported,” he said. “The Middle East isn’t exactly required to report breaches in the same way as North America, or even some locations in Europe. So, it’s never going to be recorded.”

    When a MENA security breach did become public, it was usually because hackers had hit the subsidiary of a foreign corporation whose home rules required it to report the incident, said Sherstobitoff. Moreover, the geopolitical situation spawned more attacks than elsewhere. Four-fifths of the top 100 MENA corporations are in Gulf countries – usually state-owned banks, energy firms and utilities. 

    SecurityScorecard did not state the data was unreliable when, upon publishing its findings in November, it claimed that the top 100 MENA firms beat European rivals on cyber security. It distributed a press release making the claim privately, but did not publish it with other releases on its public media page. 

    It also withholds names of firms in its reports, though it styles itself as doing for cyber risk what credit ratings agencies do for financial investors. It scans 15 million firms for vulnerabilities and tracks reports of hacking attacks, but only firms that pay get to see ratings. It sells its services in the region. 

    The would-be ratings agency noted a correlation between firms that reported no breaches and those it scored ‘A’, after assessing detailed scans it did of their security vulnerabilities, along with incident reports. Breaches diminish a firm’s rating significantly, but only briefly, according to its methodology. 

    It gave half the top 100 MENA firms A ratings – twice as many as Europe, and a fifth more than the US S&P 500. SecurityScorecard rated 84 of the 100 as either A or B. The strength of MENA cyber security, widely attributed to massive investment, was confirmed in the ITU global index, with Gulf economies ranked among the most secure in the world. 

    MENA incident reports that appear more reliable involve indirect attacks, with 84 of the top 100 firms admitting they suffered breaches caused by the mistakes of their suppliers, according to SecurityScorecard. Almost every single top EU firm reported the same. A spokesperson said that it has not produced comparable third party breaches of US firms. 

    Ross Brewer, an expert with deep experience of high-level security in the region, said MENA’s immense spending on cyber resilience was not as good in reality as on paper. “In Western societies, bad news travels fast. In the Middle East, if the government has anything to do with it, bad news does not travel at all. When you are building a utopian future that will attract global tourists, you want to present the absolute best image,” he said. 

    Firms “in these pretentious countries” did not report incidents because the culture encouraged dignified face-saving, said Brewer. Intense government control of all communications in and out of the region, and internally, was effective at catching attackers. But MENA investment in cyber defences, according to Brewer, had been hasty, shoddy and done piecemeal by expats who left behind them a fractured and vulnerable security architecture. People were afraid to speak out, he claimed. 

    Bharat Raigangari, board adviser to Dubai security consultancy 1CxO, a company which large firms in the region, said an independent security ratings agency was just what the region needed to address the security problems implied by its third party breaches. Raigangari said was trying to create one, with the backing of the UAE cyber security Council, “but it is much easier said than done”.

    It was true MENA had fewer reported incidents because firms were not inclined to report them, he said. But the region’s security, and its regulations, were maturing fast and catching up with the West. 

    Experts in the region applaud state authorities for their progress in building cyber defences and enacting legislation. 

    Yedhu Krishna Menon, head of third-party cyber security at a MENA bank, who asked for his employer to remain anonymous because it is culturally unacceptable to reveal it, said that reported incidents were low because the region’s defences were particularly good. 

    Whereas hiding security breaches to save face was not limited to MENA, a bigger concern is “reputation damage, fear of negative publicity, of stigma – it’s a global thing”, he said. 

    “They don’t report the majority because they don’t want to lose business,” he added. MENA culture had also progressed. “It’s not like 10 years back.” 

    Attackers, aiming to bring down economies and exploit vulnerabilities introduced by the region’s transforming economies, had merely prompted MENA countries to implement regulation to drive investment in security. The regulatory impetus had been momentous and like nowhere else in the world, said Menon. 

    Munir Subor, a partner at law firm Taylor Wessing in Dubai, said that it was common practice for firms in the region not to report incidents. Those reported to government would remain secret. 

    Nick Loumakis, MENA managing director at Obrela, a Greek firm working closely with UAE cyber security authorities, believed the region’s low incident numbers were correct. 

    Government was “always in the room” whenever he had dealt with an incident, but he knew of only one large firm hit in the past two years. He didn’t think saving face played a factor. “It’s not easy to keep this information hidden,” he said, believing that government control of large firms and an oligarchical economy has allowed MENA countries to stamp out attackers more effectively. 

    MENA state authorities contacted by Computer Weekly were unavailable for comment. 

    This post is exclusively published on eduexpertisehub.com

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Team

      Related Posts

      How our district turned a sea of data into a compass for change

      July 7, 2025

      Fine-tuning to deliver business AI value

      July 7, 2025

      How Teachers Are Making Computer Science Click

      July 6, 2025

      The AI arms race begins at age 4

      July 6, 2025

      From the FBI to F&A: lessons learnt in safeguarding systems and data

      July 5, 2025

      Supreme Court Ruling Highlights Continued Power Struggle Over LGBTQ+ Books in Schools

      July 5, 2025
      Courses and Software Tools

      Extreme Privacy: What It Takes to Disappear

      August 24, 202455 Views

      Modern C++ Programming Cookbook: Master Modern C++ with comprehensive solutions for C++23 and all previous standards

      September 18, 202427 Views

      Meebook E-Reader M7 | 6.8′ Eink Carta Screen | 300PPI Smart Light | Android 11 | Ouad Core Processor | Out Speaker | Support Google Play Store | 3GB+32GB Storage | Micro-SD Slot | Gray

      August 19, 202422 Views

      HR from the Outside In: Six Competencies for the Future of Human Resources

      May 20, 202517 Views

      Coders at Work: Reflections on the Craft of Programming

      April 19, 202516 Views
      Reviews

      Genesis: Artificial Intelligence, Hope, and the Human Spirit

      July 7, 2025

      Communication Skills Training: A Practical Guide to Improving Your Social Intelligence, Presentation, Persuasion and Public Speaking: Positive Psychology Coaching Series, Book 9

      July 7, 2025

      NIMO 15.6″ IPS FHD-Business-Laptop, Intel 6 Core i3-1215U 8GB RAM 256GB SSD (Beat i5-1135G7, Up to 4.4GHz) Computer with Backlit Keyboard Fingerprint 65W Type C Wi-Fi 6 Numpad Win 11

      July 7, 2025

      Cybersecurity Mastery: Malware & Hacking Techniques | Udemy Coupons 2025

      July 7, 2025

      Software Engineer in Test – Android

      July 7, 2025
      Stay In Touch
      • Facebook
      • YouTube
      • TikTok
      • WhatsApp
      • Twitter
      • Instagram
      Latest News

      How our district turned a sea of data into a compass for change

      July 7, 2025

      Fine-tuning to deliver business AI value

      July 7, 2025

      How Teachers Are Making Computer Science Click

      July 6, 2025

      The AI arms race begins at age 4

      July 6, 2025

      From the FBI to F&A: lessons learnt in safeguarding systems and data

      July 5, 2025
      Latest Videos

      Unlocking Ethical Hacking: Your Cybersecurity Career Guide

      July 7, 2025

      What is Digital Marketing? Scope, Earnings & Who Can Start a Career in It Hammad’s Digital Hub

      July 5, 2025

      Just trend #gacha #memecreator #gachaclub #gcmeme #gachalife #trend #gachememe #edit #memes

      July 4, 2025

      Kenley Jansen notches his 1,000th career MLB strikeout | August 25, 2021 | Dodgers @ Padres

      July 3, 2025

      Top 5 Cyber Security Jobs in India || Cyber Security Career 2024

      July 2, 2025
      Latest Jobs

      Software Engineer in Test – Android

      July 7, 2025

      Wetland Scientist

      July 7, 2025

      Powertrain Mechanical Engineer

      July 7, 2025

      Experienced Tax Preparer

      July 7, 2025

      barista – Store# 08693, 1ST ST & W MILL RD

      July 7, 2025
      Legal
      • Home
      • Privacy Policy
      • Cookie Policy
      • Terms and Conditions
      • Disclaimer
      • Affiliate Disclosure
      • Amazon Affiliate Disclaimer
      Latest Udemy Coupons

      Mastering Maxon Cinema 4D 2024: Complete Tutorial Series | Udemy Coupons 2025

      August 22, 202435 Views

      Advanced Program in Human Resources Management | Udemy Coupons 2025

      April 5, 202531 Views

      Diploma in Aviation, Airlines, Air Transportation & Airports | Udemy Coupons 2025

      March 21, 202530 Views

      Python Development & Data Science: Variables and Data Types | Udemy Coupons 2025

      May 24, 202521 Views

      Time Management and Timeboxing in Business, Projects, Agile | Udemy Coupons 2025

      April 2, 202521 Views
      Blog

      3 Ways To Network Over Summer Vacation And Grow Your Career

      July 3, 2025

      Why Community Is Your Most Valuable Career Asset In 2025

      June 28, 2025

      What Employers Are Really Looking For In Job Interviews

      June 27, 2025

      The Best Way to End a Cover Letter (With 4 Winning Examples)

      June 26, 2025

      5 Job Interview Secrets To Beat The Competition

      June 25, 2025
      Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
      © 2025 All rights reserved!

      Type above and press Enter to search. Press Esc to cancel.

      We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
      .
      SettingsAccept
      Privacy & Cookies Policy

      Privacy Overview

      This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
      Necessary
      Always Enabled
      Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
      Non-necessary
      Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
      SAVE & ACCEPT