Tech Features
How Telecommunications Providers Can Best Tackle DDoS Attacks

By: Amr Alashaal, Regional Vice President – Middle East at A10 Networks
There is an increasing incidence of cyberthreats posed to telecommunications providers. There is a definite need for telcos to strengthen their overall security posture and improve resilience against service-impacting attacks, such as DDoS attacks. The good news is that we have seen communication service providers (CSPs) responding to these higher threats and tighter compliance requirements. Our 2023 research, which surveyed 2,750 senior IT professionals in CSPs, suggests that they are investing in enhancing their network security to counter increasingly sophisticated cyber threats such as DDoS attacks.
Adopting a defence-in-depth approach
Over the last two years, CSPs have made significant progress in upgrading their cyber defences. In our inaugural CSP 2021 study, we found the highest priority security investments were for more basic security upgrades such as firewalls.
With 68% of all 2023 respondents expecting network traffic volumes to increase by over 50% in the next two-three years, firewalls and other security appliances must be routinely upgraded just to handle the increased traffic volume. Despite this, the percentage prioritising firewalls dropped from 48% in 2021 to 28% in 2023.
The growing importance of DDoS detection and monitoring
Other investments deemed nearly as important as firewalls were DDoS detection and monitoring, automation of security policies, investment in ransomware and malware protection services, and threat intelligence. Respondents also indicated interest in simplifying and integrating disparate point solutions.
This all points to a higher focus on security investments overall and a greater focus on capabilities that enable a more proactive approach rather than reactive response, such as DDoS detection (now the second highest priority) versus reactive DDoS attack mitigation (the least important priority) in the 2023 survey.
Additionally, with telecommunications considered a critical infrastructure, telecommunications organisations have a unique responsibility to protect the availability of their networks, data, and services.
This is an increasingly complex task as traffic volumes surge, and they build out to more remote and vulnerable communities. To achieve this, we recommend telecommunications providers should follow the below key steps:
- Prioritise security investments to protect all domains. This includes the network itself, customer databases, customer facing services such as websites, and internal IT systems. Many DDoS attacks and security breaches in CSPs are targeting customer proprietary data.
- Replace legacy DDoS defence systems and deploy new technologies that enable more granular detection using AI, machine learning, threat intelligence, and other capabilities that match the increasing sophistication of attacks.
- Leverage automation to simplify management, improve control over network resources, and guarantee uptime.
Intelligent and automated DDoS protection solutions
DDoS protection is crucial for CSPs’ infrastructure. It’s essential to block malicious traffic without disrupting legitimate traffic. Intelligent and automated DDoS protection solutions play a vital role, offering scalability, cost-effectiveness, precision, and intelligence. These solutions help CSPs ensure optimal user and subscriber experiences by efficiently identifying abnormal traffic, automatically mitigating inbound DDoS attacks, and providing a centralized point of control for seamless DDoS defense execution.
So, what should telecommunications companies look out for to prevent a DDoS attack?
- A sudden and/or unexpected increase in traffic. Though there are legitimate reasons to receive more traffic, a sudden increase should be checked.
- System slowness or non-response. Websites can load slowly, or not at all, for many reasons—this doesn’t mean a DDoS attack is in progress, but it should be investigated.
- Unusual traffic patterns. For example, when current traffic deviates from normal traffic patterns, such as inconsistent traffic with a typical user base, and receiving traffic at unusual hours.
- Increase in traffic to a single endpoint. This is when part of your system, such as a specific URL, suddenly receives a high amount of traffic compared to others.
- A high volume of traffic from a single IP or small range of IPs. This indicates that these addresses could be part of a larger botnet.
A market expected to reach $7.45 billion by 2030
Recent research highlights a significant impact of DDoS attacks, revealing a 200% increase in the first half of 2023. Telecommunications companies, experiencing most attacks, contribute to about half of the overall attack volume. This is a key factor in the projected growth of the global DDoS protection and mitigation market to $7.45 billion by 2030.
In 2024, the telecommunications industry will continue prioritizing technologies like cloud computing, standalone 5G, AI, and IoT to enhance speed, scalability, and innovation. To support these technologies, providers must reinforce their cybersecurity architectures. While progress has been noted, a stronger focus on a layered and defense-in-depth approach, especially regarding DDoS attacks, is essential.
Tech Features
AI and Digital Currencies Transform MENA Into Rising Fintech Leader

By Naser Taher, Chairman of MultiBank Group

The Middle East and North Africa (MENA) region has become the leading laboratory for financial innovation, where artificial intelligence (AI), central bank digital currencies (CBDCs), and sovereign wealth fund (SWF) strategies converge to reshape global cash flows. According to the World Economic Forum, venture capital investments in MENA grew by about 33% a year from 2015 to 2023, with funding reaching $644 million in 2024. This surge reflects deliberate efforts to position the region as a fintech powerhouse for the new economy.
One of the most significant developments is the strategic collaboration between the Abu Dhabi Investment Office (ADIO) and the Trump Organization to establish an AI and Web3 Free Zone. The $6.6 billion initiative aims to attract global tech firms, AI researchers, and fintech ventures to the UAE, further cementing MENA’s leadership in next-generation digital infrastructure.
Machine learning algorithms now process trades worth billions on Saudi Arabia’s Tadawul exchange daily, while automated risk assessment systems evaluate loan applications in real time from Dubai to Riyadh. Saudi Arabia’s Financial Sector Development Program has embedded AI throughout its capital markets ecosystem as part of Vision 2030’s broader economic transformation. PwC analysis projects this technological integration will generate almost $135 billion for the country’s economy by 2030, fundamentally altering how banks manage liquidity, assess credit risk, and compete regionally.
Central banks across the Gulf have moved beyond theoretical frameworks into live testing of digital currencies. The UAE’s Digital Dirham is set to enter retail circulation through licensed banks and fintech companies by late 2025, enabling near-instant cross-border payments where traditional banking requires days and charges hefty fees. Meanwhile, Saudi Arabia and the UAE have jointly piloted Project Aber, issuing a single wholesale CBDC.
Gulf SWFs are reshaping the region’s infrastructure landscape, no longer content with simple portfolio plays. These institutions now control $4.9 trillion in assets, with projections reaching $7.3 trillion by 2030. In the first nine months of 2024, they accounted for 40% of all international SWF transactions, deploying $55 billion across 126 deals. Notably, Abu Dhabi’s Investment Authority and Saudi Arabia’s Public Investment Fund (PIF) are increasing allocations to blockchain and digital projects. In Qatar, the Qatar Investment Authority is working through the Qatar Financial Centre’s new Digital Asset Regulations 2024 to trial real-world asset tokenization.
Alongside these public sector moves; private institutions are also innovating on a scale. MultiBank’s new Electronic Communication Network (ECN) will introduce the Gulf’s first interbank trading and prime brokerage ecosystem, linking BRICS and GCC jurisdictions. Designed to compete with Western counterparts such as Bloomberg and Reuters, it connects conventional trading desks to machine-driven order routing and the MultiBank Chain’s tokenization layer. Cross-border deals become faster, safer, and more transparent, with settlements possible in gold or a mix of currencies instead of U.S. dollars alone. By opening the door to tokenized real-world assets and other decentralized products, the network sharpens the Gulf’s bid to serve as a global finance hub.
However, important challenges remain. Fintech ventures still need to navigate a maze of rules that shift from one border to the next; a single, region-wide framework would let ideas—and capital—move faster. As more money flows online, hackers gain fresh openings, and cybersecurity becomes even more critical. And while Gulf youth embrace tech with ease, the GCC needs far more specialists who can work with blockchains, train risk models, and secure CBDC payment rails. That calls for a push on everything from university courses to mid-career reskilling.
The next breakthrough won’t come from technology alone but from how well policymakers, entrepreneurs, and the sovereign heavyweights backing them work in sync. CBDC pilots are live, AI already guides trading desks, and deep pools of patient capital sit ready to fund new ideas. If the region’s key players keep pulling in the same direction, the Gulf won’t just join the digital finance conversation—it could end up leading it.
Tech Features
Unleash Unmatched Cyber Defense: Sophos Firewall v21.5’s Breakthrough NDR-Essential


Sophos, a global leader in innovative security solutions for defeating cyberattacks, recently announced an update to its Sophos Firewall. Now, Sophos Firewall includes Sophos NDR Essential—free for all customers with an XStream Protection license.
With this integration, Sophos Firewall leverages two dedicated artificial intelligence engines to detect malware communications and algorithmically generated domain names. This new capability, powered by the Sophos Network Detection and Response probe, identifies previously unknown threats and complements the Active Threat Response features already in place.
According to Chris McCormack, Senior Product Marketing Manager at Sophos, “NDR traffic analysis requires substantial processing power. That’s why we’ve adopted a new approach by deploying an NDR solution in Sophos Cloud to offload the heaviest tasks from the firewall.”
Sophos Connect Integrates EntraID for SSO
The VPN client bundled with Sophos Firewall now supports EntraID (Azure AD) for single sign-on. This enhancement secures SSL and IPsec VPN connections and improves user experience by adding multi-factor authentication for both Sophos Connect and the user portal.
Other VPN-related improvements include:
- –Intuitive interface updates: “Site-to-site” is now “policy-based,” and “route-based” tunnel interfaces are renamed for clarity.
- –Dynamic IP pool validation: Prevents address conflicts across SSL VPN, IPsec, L2TP, and PPTP.
- –Strict profile enforcement: Excludes default IPsec profile values to ensure algorithm synchronization and eliminate session negotiation issues.
- –Enhanced scalability: Supports up to 3,000 route-based VPN tunnels, 1,000 SD-RED site-to-site tunnels, and 650 concurrent SD-RED devices.
Additional Management Enhancements
Furthermore, Sophos has rolled out several management improvements to streamline daily operations:
–Flexible IPv6 DHCP-PD: Supports /48 to /64 prefixes for better ISP compatibility.
–RA and DHCPv6 server enabled by default: Simplifies IPv6 deployments.
–Resizable table columns: Improves the admin interface on ultra-wide screens.
–Advanced search: SD-WAN routing and local ACL rules now support name, ID, and content-based searches.
–Default configuration updates: Only the default network and MTA rules are provided; custom gateway probes and rule groups default to “None.”
Secure by Design
Moreover, Sophos continues to harden its firewall platform with a secure-by-design approach. Specifically, features are containerized, and integrity checks on critical OS files use mathematical checksums—any mismatch triggers an alert. Consequently, monitoring teams can swiftly identify potential compromises and react accordingly.
Availability
Customers can download and deploy this update manually on any Sophos Firewall with a valid license.
For more on Sophos’s Middle East strategy, check out our previous coverage:
Sophos Announces Intent to Expand Middle East Operations with New Data Center in the UAE
Tech Features
Driving the Future: How Logical Data Management Powers EV Innovation in the UAE


Logical data management is revolutionizing EV production in the UAE by replacing slow, siloed systems with a virtualized data layer. Consequently, manufacturers like Seres report an 88% reduction in data delivery time, empowering on-shop-floor decision-making and accelerating Industry 4.0 initiatives.
The Rise of Logical Data Management in EV Manufacturing
Under the UAE’s Operation 300bn strategy, EV production faces surging data volumes. Traditional ETL pipelines buckle under real-time demands. By contrast, logical data management—often called data virtualization—creates a semantic layer that unifies multiple stores without replication. This approach slashes latency, reduces storage overhead, and accelerates analytics across design, production, and operations.
Limitations of Traditional Data Systems for EV Production
Legacy batch-driven data warehouses delay critical actions. In a high-stakes assembly line, even millisecond lags can compromise quality or safety. Moreover, centralized silos inflate storage and governance costs, especially under strict UAE data-sovereignty laws. Static architectures simply cannot keep pace with AI-driven analytics or digital twin simulations.
Adopting Logical Data Management for Real-Time Insights
Firstly, Logical data management platforms (Denodo) let shop-floor teams query live data instantly. For example, EV manufacturer Seres cut data delivery time by 88% and built 600+ self-service analytics apps. Furthermore, virtualized data services simplify compliance with role-based security, ensuring governed access to sensitive vehicle-PII under UAE regulations.
Implementation Strategy for Logical Data Management
1-Identify critical data sources affecting safety, cost, and sustainability
2-Pilot virtualization on latency-sensitive processes such as battery-pack assembly
3-Enforce governance policies to maintain data integrity and security
4-Train non-technical staff on user-friendly analytics tools
5-Monitor production metrics improvements to scale across the factory
Additionally, regular reviews help refine and scale each phase effectively.
Future Outlook for Logical Data Management in the UAE EV Market
Looking ahead, as the EV sector grows beyond the current US$1.8 billion market, data becomes as vital as any physical component. Therefore, by valuing data on par with hardware, UAE factories can slash defects, boost efficiency, and maintain a competitive advantage. Consequently, early adopters of logical data management will lead the next wave of automotive innovation.
For more on cutting-edge EV innovations in the region, check out our feature:
NIO’s Industry-Leading Innovations Set New Benchmarks for Intelligent Premium Electric Mobility
-
Tech News12 months ago
Denodo Bolsters Executive Team by Hiring Christophe Culine as its Chief Revenue Officer
-
Tech Interviews1 year ago
Navigating the Cybersecurity Landscape in Hybrid Work Environments
-
VAR3 months ago
Microsoft Launches New Surface Copilot+ PCs for Business
-
Tech News1 year ago
Brighton College Abu Dhabi and Brighton College Al Ain Donate 954 IT Devices in Support of ‘Donate Your Own Device’ Campaign
-
VAR11 months ago
Samsung Galaxy Z Fold6 vs Google Pixel 9 Pro Fold: Clash Of The Folding Phenoms
-
Tech Features1 year ago
The Middle East to Lead with Next-generation Mission Critical Communication Advancement
-
Features1 year ago
Security in the Cloud Age: Combating Risks with Hybrid Cloud Solutions
-
Automotive1 year ago
Al-Futtaim Automotive Builds On 23-Year Legacy of Trust & Leadership in UAE’s Pre-Owned Car Market to Sell Over 25,000 Used Vehicles in 2023