Tech Interviews
Privacy, Trust and Security: Cornerstones of Urban Futurism
Internet of Things (IoT) is transforming the way we live and transact as a society. With the number of connected devices proliferating, cyber threats will increase as cybercriminals have a lucrative target. Gordon Love, Vice President, EMEA Emerging Region, Symantec tells The Integrator what precautions businesses and end-users can take with these smart devices.
Q1. How will Internet of Things transform the way we live?
A1. Internet of Things (IoT) has already transformed the way we live today and will continue to do so as we adopt more and more internet-connected devices. While new IoT devices can bring great benefits to our everyday lives, they also have the potential to become serious security risks and can be an easy and lucrative target for cybercriminals. Whether through fitness trackers and routers to home security systems, smart TVs and baby cameras, cybercriminals are starting to pay attention and threats are on the rise.
Cybercriminals are interested in cheap bandwidth to enable bigger attacks. They obtain this by hijacking our devices and stitching together a larger web of consumer devices that are easy to infect because they lack sophisticated security. All they need to do is pre-program their malware with commonly used and default passwords, allowing them to easily hijack device passwords.
As we see more and more consumer devices being hijacked because they are connected to the internet and their default device passwords have not been changed, a bigger emphasis on securing these devices is needed. According to Symantec’s Internet Security Threat Report published earlier this year, IoT devices continue to be ripe targets for exploitation. Symantec found a 600 percent increase in overall IoT attacks in 2017, which means that cyber criminals can exploit the connected nature of these devices.
Q2. There is a proliferation in the number of smart devices across the globe, including smart homes, increasing the surface and vulnerability to cyber-attacks. What security hygiene must be followed to mitigate these threats?
A 2. Security varies a lot with different smart devices, so it is difficult to give generic advice to users. It is important that users remain vigilant when installing smart home devices and make sure that the device configuration settings are understood.
Here are a few points to consider when installing smart devices, which can also be used for home as well:
• Use strong and unique passwords for device accounts and Wi-Fi networks
• Change default passwords
• Use a stronger encryption method when setting up Wi-Fi networks, such as WPA2
• Disable or protect remote access to IoT devices when not needed
• Use wired connections instead of wireless, where possible
• Use devices on a separate home network, when possible
• Be careful when buying used IoT devices, as they may have been tampered with
• Research the vendor’s device security measures
• Modify the privacy and security settings of the device to your needs
• Disable features that aren’t needed
• Install updates when they become available
• Ensure that an outage, for example due to jamming or a network failure, does not result in an unsecure state of installation
• Verify if smart features are really required or if a normal device would be sufficient
Q3. What is ambient security and how does it help secure IoT?
A3. An ecosystem of devices, which we call “ambient computing”, offers a theoretical hope that we can change the game of security for IoT, and move closer to the long-term goal of absolute cyber security in the Internet of Things era.
This is how this work. Imagine if your device was connected to a cloud-based service that delivered “always on” security? What’s more, the device wouldn’t be able to connect to anything except through that particular security service, which would offer full protection against any imaginable cyber-attacks cooked up by the bad guys.
This isn’t fantasy. We already do something similar for laptops, smartphones, and tablets with “firewall as a service” offerings. Many enterprises also use cloud-based services with global deployments of security hardware so that wherever they connect, employees are connecting through these security sites.
Some may be connecting over an untrusted local connection but that’s why those services set up a “personal” crypto connection, thus eliminating the need to trust a particular local network. What’s more, everything is encrypted from the device to a secure site, which deploys security hardware to protect users from potential attack.
Of course, firewalls aren’t enough. That’s why such services need full proxies and careful “key management.” That allows the security hardware to even defend against attacks tunneling through encrypted web connections. Fortunately, this exists today in commercial services like Symantec’s Web Security Service (WSS).
Q4. What can be done to ensure a strong and secure foundation for urban futurism?
A4. Today, and into the future, the Internet of Things (IoT) will continue to see humanity take a new foundation (the Internet) and use it to build things that fundamentally change the way we live our lives.
It is difficult not to get excited about self-driving cars that learn from each other, connected homes that allow us to remotely monitor and control our personal spaces and smart meters that have a profound impact on a nation’s energy consumption. But, there are likely to be unintended consequences to all of these ideas that technologists (even the really clever ones) are likely to miss given the current drive for innovation that is being encouraged by both the private and the public sector.
At Symantec, our primary concerns with regard to urban futurism have to do with personal privacy, trust and the security of systems and information. Interestingly (and with a few exceptions) a great number of the technologies needed to facilitate a trust-worthy and secure IoT already exist. Now, a great deal of work needs to be done to push this forward and to create working frameworks within which we can all operate and collaborate to create useful and trustworthy solutions that
Tech Interviews
Qlik and Cognizant Explore the Transformative Potential of AI in the Middle East
Exclusive Interview with Kelly Forbes, AI Advisory Council Member, Qlik
How would you describe the collaboration between Qlik and Cognizant evolving in the future
It’s been great to see Qlik and Cognizant tapping into their partnership to support this transition. This collaboration really stems from a shared respect for the challenges ahead. There’s a significant amount of awareness and education that needs to happen, and we’ve seen some of that progress here today, where people can openly discuss the challenges they’re facing on the ground.
This creates an opportunity to differentiate between the broad potential of AI and how each organization can develop specific recommendations to address their unique challenges. It’s about identifying the role AI plays in tackling those issues while ensuring organizations can fully prepare their workforce for the changes that lie ahead.
Through this partnership, we can work together and collaborate to address challenges while utilizing technology to solve problems and seize opportunities. The potential of AI is vast and can be applied across various sectors. However, the focus should be on understanding the specific, day-to-day problems organizations face and exploring how AI can play a pivotal role in addressing those challenges.
When it comes to adopting AI, what are some challenges that you can discuss, and what are organizations in the region currently facing?
I think the biggest challenge is around resistance, right? We’re currently in a stage where technology is becoming normalized, and we’re getting used to it. When people work, there’s often a question of, ‘What can this technology do for us?’ There’s a significant need for education and awareness about how AI will change the way people work.
Currently, there’s a stigma and concerns about whether AI is taking jobs away. I think the more familiar people become with AI, the more comfortable they’ll feel learning and working alongside it. That’s the transition we need to make.
This is where partnerships can play a vital role—bringing organizations together to build awareness and create activities that address these concerns. Typically, through shared experiences and collaboration on these topics, organizations can learn from each other as we collectively navigate this transition.
How do you see the investment landscape in the Middle East in terms of AI adoption?
I think it’s an exciting space to be in. This region is doing so much. The potential value of AI in the Middle East is estimated at around $320 billion.
Here in the UAE, we’re seeing significant investments and infrastructure development, as well as the implementation of policies that support AI. They also have ambitious projects in the pipeline, many of which are driven by AI and automation.
The next step is linking all these different initiatives together. It’s about how governments can fully tap into this potential while ensuring that progress happens in a responsible way.
As part of my presentation, I’ve outlined guiding questions to help organizations and governments think about this responsibility. Collaborating with Qlik has been rewarding because we’re focused on how companies can play a leading role in this transformation.
How do you see regulations being implemented in the AI sphere? How do you think organizations will cooperate with these regulations?
It’s a very challenging space, and it’s evolving quickly. In the last one or two years, we’ve seen a lot of changes. Here in the UAE, they’re thinking carefully about regulations, particularly in the data protection space, and how these need to adapt to AI.
Globally, we’re seeing similar developments. For example, Europe’s AI Act is a significant step forward. The reality is that international developments, like what’s happening in Europe, will undoubtedly shape and impact businesses here. If you’re doing business with Europe, those regulations will affect the way you operate.
This creates a balancing act for companies. They need to reflect these international expectations in their operations here, especially large companies with a global presence.
At the same time, this is an opportunity for businesses that are paying close attention to these developments. Those who adapt quickly will be at the forefront of this transition.
What’s the future of work like with the popularization of AI?
I don’t think anyone can answer that with complete certainty, but we do know AI is changing the future of work. On one hand, it’s automating many tasks, and there’s a possibility that some roles might disappear. On the other hand, it’s also creating new jobs.
The key is to think about how we manage this transition—how we provide opportunities for people to learn new skills and upskill so they’re equipped to take on these new roles. That’s going to be crucial in shaping the future of work.
Tech Interviews
Galaxy AI Pioneers Program: Samsung’s Mission to Build an AI-Savvy Generation
Exclusive interview with Shafi Alam, Director and Head of Direct-to-Consumer Business & Corporate Marketing, Samsung Gulf Electronics
What inspired Samsung to launch the Galaxy AI Pioneers program, and how does it align with the UAE’s vision of building a knowledge-based, AI-savvy generation?
The Galaxy AI Pioneers program represents Samsung’s strategic vision to cultivate AI literacy at a grassroots level, democratizing AI education and making machine learning, robotics, and coding accessible to all.
Carefully structured across three age-specific cohorts, the program ensures age-appropriate learning and development. Strategically, the progam leverages a hybrid learning model that combines weekday virtual sessions with hands-on weekend training, hosted at the prestigious Coders HQ in Emirates Towers. This structure not only allows students to gain a deep understanding of AI theory, but also ensures they receive practical, real-world experience. By partnering with national initiatives such as the UAE’s National Program for Coders, we are proud to position ourselves as a pivotal contributor to the UAE’s vision for a AI-powered, knowledge-based economy.
Through the Galaxy AI Pioneers program, Samsung is empowering young minds to lead future innovation, ensuring they are equipped with the skills to thrive in a rapidly evolving landscape.
The program covers a broad range of AI topics, including ethical considerations in AI. Could you explain why ethics is a critical part of the curriculum for students aged 12-17?
Ethics in AI is fundamental for fostering a responsible, conscientious generation of tech users and creators. Beyond ethics, however, is the equally crucial aspect of digital safety – an area that goes hand in hand with ethical considerations. In today’s world, as AI technology becomes more embedded in daily life, understanding digital safety is essential to protecting both personal and community well-being.
The curriculum includes topics like data privacy and safe online practices, teaching students to make responsible choices while navigating the digital landscape to keep themselves safe. By learning about secure coding practices and data protection, students gain a comprehensive view of how to use AI responsibly and securely. This approach instills ethical values and empowers young innovators to contribute to a safer, more secure technology ecosystem as they develop AI-driven projects.
As the program continues to grow, what kind of impact do you hope to see in the UAE’s tech landscape from these young AI pioneers in the coming years?
The comprehensive structure of the Galaxy AI Pioneers program suggests a transformative impact on the UAE’s technological landscape. The program’s meticulous progression from fundamental concepts through to sophisticated applications like machine learning, computer vision, and AI robotics lays a robust foundation for future innovation. By training students in practical tools such as Python libraries and Galaxy AI applications while simultaneously developing their understanding of ethical considerations, the program is cultivating a generation of well-rounded AI practitioners.
The final capstone project requirement ensures that the graduates emerge not just with theoretical knowledge but with demonstrable experience in creating AI solutions. This combination of technical expertise, practical experience, and ethical awareness positions these young pioneers to drive meaningful innovation in the UAE’s tech sector, potentially leading to breakthroughs in areas like natural language processing, computer vision, and robotics while maintaining a responsible approach to AI development that considers societal implications.
With the success of our pilot version of the Galaxy AI Pioneers program, which received an overwhelming response from both students and parents alike, we have begun to roll out the program as part of the curriculum within select schools across the UAE, with plans to expand further in the future.
Tech Interviews
Sentinel One Pioneers AI-Powered Cybersecurity Solutions for Modern Enterprises
Exclusive interview with Ezzeldin Hussein, Regional Senior Director Sales Engineering, (META)
How does the SentinelOne Singularity platform streamline cybersecurity operations, and what are the key benefits of using this unified platform?
Since we’ve talked about my journey from data centers, let me share a common question I used to ask CIOs: “How many vendors are you working with for storage? Servers? Networking?” Typically, the answers ranged from one to five vendors. But when I asked about cybersecurity, the answer was often 60 to 120 vendors. This vendor sprawl creates a headache for cybersecurity teams and CISOs. At SentinelOne, our mission has been to address this challenge. Consolidation is now a key trend in cybersecurity. Ask any CISO today, and they’ll tell you their main goal is to downsize from managing 120 vendors to maybe 5 or 10.
The SentinelOne Singularity platform helps achieve this by offering a unified solution. Instead of relying on multiple, disconnected security products, this platform provides all the features and functions needed in one place. It secures endpoints (Windows, Mac, Linux), workloads (in data centers or on multi-cloud environments), identity, data security, and more—all in one platform. What sets the Singularity platform apart is its use of AI. We’ve been leveraging AI since 2013 and have now integrated generative AI, which is critical and highly relevant today.
How does Purple AI enhance threat detection and the efficiency of teams managing complex threats?
The simplest way to explain Purple AI is by asking customers if they use ChatGPT—and the answer is always yes because everyone uses it today. Now imagine giving your security team a tool like ChatGPT, integrated into the platform. With Purple AI, your team doesn’t need to worry about complex queries, syntax errors, or spending hours troubleshooting. Instead, they can use natural language to ask questions like: “Do I have an attack in my environment? Where is it coming from? Which machines are affected? Who is logged in?” The answers are displayed instantly.
Since we’ve integrated generative AI, Purple AI goes beyond simple detection. It guides your security team, speeds up detection, and makes threat-hunting far more efficient. Two key factors are critical for effective threat management: speed and intelligence. Purple AI delivers both. The speed comes from instant access to actionable information, enabling the SOC team to detect, respond to, and mitigate threats quickly. The intelligence comes from analyzing data to detect patterns and behaviors that traditional, manual processes might miss. Purple AI leverages large language models, a robust knowledge base, and global threat intelligence to make this possible.
What challenges have you faced when introducing new products like Purple AI and the Singularity platform to the market?
When you introduce new technology, customers are often skeptical. I always tell them it’s simple: try it. Let’s agree on an objective, create a pilot, and allocate some time and resources. Our team will work with yours to show how Purple AI can fill gaps or address missing elements in your environment. Our focus is on demonstrating ROI. Purple AI isn’t just something to purchase for fun—it delivers tangible benefits. For example, threat-hunting activities that used to take hours now take seconds. This drastically reduces the workload for SOC teams.
One feature SOC teams particularly appreciate is Purple AI’s ability to summarize incidents. After spending time investigating an attack, the team still needs to create a report for the CISO. Many team members struggle with this, especially since writing isn’t their strong suit, and English might not be their first language. With Purple AI, they can generate a clear, well-formatted, 3-page report in seconds. This saves them hours and ensures that critical updates are communicated effectively. This is why we believe the future of cybersecurity lies in generative AI—not just for analysis, but to make sense of results, communicate efficiently, and act quickly.
What trends do you anticipate looking at future of cybersecurity through the lens of AI?
AI is no longer just a fancy tool. Attackers have started using it, and as they evolve, so must we. To defend against AI-based attacks, we absolutely need AI-powered defense mechanisms. The next era of cybersecurity will inevitably become AI versus AI. It’s like a scenario from a movie, but it’s happening now. Attackers are already integrating AI into their methods, making it easier than ever to execute sophisticated attacks. Before, creating malware required highly skilled individuals. Now, with AI tools, it’s accessible to anyone. Here’s the critical difference: attackers only need one single opportunity to breach your environment, while cybersecurity vendors and their customers must work 24/7 to ensure 100% protection. This is where AI becomes crucial—not just as a defense mechanism but as a virtual assistant that works tirelessly to identify and mitigate threats in real time.
In our region, certain cultural and social factors also play into this dynamic. For instance, during Ramadan, people often take time to break their fast. Or think about engaging in leisure activities, like watching a 90-minute football game. Even cybersecurity teams may want to take a break. Attackers, however, recognize these moments of reduced vigilance and are quick to exploit them. AI can bridge these gaps, continuously monitoring and analyzing activity, and promptly alerting us to potential threats, even when human attention is elsewhere.
Zero-trust will also be a major trend in the coming years. More organizations are looking to implement zero-trust frameworks because of the rising prevalence of identity-based attacks and insider threats. Securing identities will become a central focus as businesses work to mitigate risks stemming from compromised credentials or internal vulnerabilities. In summary, these trends reflect how the landscape of cybersecurity is transforming and how AI is playing a pivotal role in ensuring robust defenses in a rapidly evolving threat environment.
Could you share your experience at GITEX and reflect on your journey over 26 years with the event?
I’ve been attending GITEX since 1998. At that time, I was working in a software house and was focused on programming and coding, which I really enjoyed—and still do, if I get the chance. Back then, I developed software for hospital management information systems, covering everything from clinical management to backend functions like inventory, purchasing, and pharmacy. That was where my GITEX journey started.
My first GITEX in 1998 was all about presenting this software to customers. It was a completely different experience compared to today. Back then, there was a “shopper” area where people would sell products, and the exhibition had separate areas for hardware and software. Eventually, they removed the shopper area because it caused too much traffic and chaos. Fast forward to today, and now we have specialized sections like the Cybersecurity Valley, where companies in the same domain are consolidated. This creates a better environment for interacting with customers.
Over time, I shifted from application development to the infrastructure side, specifically data centers. I wanted to ensure that the applications I developed ran on robust infrastructure. That’s what led me to VMware, where I worked on virtualization, cloud, hybrid cloud, and multi-cloud environments as they matured. After addressing infrastructure challenges, I moved into cybersecurity to secure those applications and environments. It’s been a natural progression—starting with creating applications, then managing where they run, and finally focusing on securing them.
-
Tech News6 months ago
Denodo Bolsters Executive Team by Hiring Christophe Culine as its Chief Revenue Officer
-
Tech Interviews10 months ago
Navigating the Cybersecurity Landscape in Hybrid Work Environments
-
Tech News10 months ago
Brighton College Abu Dhabi and Brighton College Al Ain Donate 954 IT Devices in Support of ‘Donate Your Own Device’ Campaign
-
Features8 months ago
Security in the Cloud Age: Combating Risks with Hybrid Cloud Solutions
-
Tech Features7 months ago
The Middle East to Lead with Next-generation Mission Critical Communication Advancement
-
VAR5 months ago
Samsung Galaxy Z Fold6 vs Google Pixel 9 Pro Fold: Clash Of The Folding Phenoms
-
Tech News1 year ago
Senet enters MENA’s Competitive Gaming Scene with ‘skill-to-earn’ Platform
-
Automotive11 months ago
Al-Futtaim Automotive Builds On 23-Year Legacy of Trust & Leadership in UAE’s Pre-Owned Car Market to Sell Over 25,000 Used Vehicles in 2023