Tech News
Cisco Reimagines Security for Data Centers and Clouds in Era of AI
News Summary:
Cisco powers and secures AI-scale data centers and clouds, safeguarding every application and device regardless of distribution or connectivity.
- In today’s highly distributed landscape, the window from vulnerability to exploitation is shrinking rapidly.
- Defending against this complex threat environment is beyond human scale.
- Cisco Hypershield enables customers to deploy security wherever needed: in the cloud, data center, factory floor, or hospital imaging room.
- With AI-native security, customers can autonomously segment networks, enjoy distributed and instant exploit protection without patches, and experience self-qualifying software upgrades with zero downtime.
News in Detail:
Cisco, the leader in security and networking, today unveiled a radically new approach to securing data centers and clouds in response to the increasing demands the AI revolution has put on IT infrastructure. Cisco is rearchitecting how we harness and protect AI and other modern workloads with industry-first, Cisco Hypershield. With this unprecedented innovation, Cisco is tipping the scales in favor of defenders, building on its recent announcements to accelerate AI infrastructure with Cisco’s ethernet switching, silicon and compute portfolio.
Cisco Hypershield protects applications, devices and data across public and private data centers, clouds and physical locations – anywhere customers need it. Designed and built with AI in mind from the start, Hypershield enables organizations to achieve security outcomes beyond what has been possible with humans alone.
“Cisco Hypershield is one of the most significant security innovations in our history,” said Chuck Robbins, Cisco Chair and CEO. “With our data advantage and strength in security, infrastructure and observability platforms, Cisco is uniquely positioned to help our customers harness the power of AI.”
Hypershield is a revolutionary new security architecture. It’s built with technology originally developed for hyperscale public clouds and is now available for enterprise IT teams of all sizes. More a fabric than a fence, Hypershield enables security enforcement to be placed everywhere it needs to be. Every application service in the datacenter. Every Kubernetes cluster in the public cloud. Every container and virtual machine (VM). It can even turn every network port into a high-performance security enforcement point, bringing completely new security capabilities not just to clouds, but to the data center, on a factory floor, or a hospital imaging room. This new technology blocks application exploits in minutes and stops lateral movement in its tracks.
“AI has the potential to empower the world’s 8 billion people to have the same impact as 80 billion. With this abundance, we must reimagine the role of the data center – how data centers are connected, secured, operated and scaled,” said Jeetu Patel, Executive Vice President and General Manager for Security and Collaboration at Cisco.

“The power of Cisco Hypershield is that it can put security anywhere you need it – in software, in a server, or in the future even in a network switch. When you have a distributed system that could include hundreds of thousands of enforcement points, simplified management is mission critical. And we need to be orders-of-magnitude more autonomous, at an orders-of-magnitude lower cost.”
Security enforcement with Hypershield happens at three different layers: in software, in virtual machines, and in network and compute servers and appliances, leveraging the same powerful hardware accelerators that are used extensively in high-performance computing and hyperscale public clouds.
Hypershield was built on three key pillars:
• AI-Native: Built and designed from the start to be autonomous and predictive, Hypershield manages itself once it earns trust, making a hyper-distributed approach at scale possible.
• Cloud-Native: Hypershield is built on open source eBPF, the default mechanism for connecting and protecting cloud-native workloads in the hyperscale cloud. Cisco acquired the leading provider of eBPF for enterprises, Isovalent, earlier this month.
• Hyper-Distributed: Cisco is completely reimagining how traditional network security works by embedding advanced security controls into servers and the network fabric itself. Hypershield spans all clouds and leverages hardware acceleration like Data Processing Units (DPU) to analyze and respond to anomalies in application and network behavior. It shifts security closer to the workloads that need protection.
Cisco, with its industry-leading expertise in networking, security and extensive partner ecosystem, together with NVIDIA, is committed to building and optimizing AI-native security solutions to protect and scale the data centers of tomorrow. This collaboration includes leveraging the NVIDIA Morpheus cybersecurity AI framework for accelerated network anomaly detection, as well as NVIDIA NIM microservices for powering custom security AI assistants for the enterprise. NVIDIA’s class of converged accelerators combine the power of GPU and DPU computing, to augment Cisco Hypershield with robust security from cloud to edge.
“Enterprises across all industries are seeking the security that can protect them against ever expanding cyber threats,” said Kevin Deierling, Senior Vice President of Networking at NVIDIA. “Together, Cisco and NVIDIA are leveraging the power of AI to deliver powerful, incredibly secure data center infrastructure that will enable enterprises to transform their businesses and benefit customers everywhere.”
As a revolutionary new security architecture, Hypershield is solving three key customer challenges in defending against today’s sophisticated threat landscape:
• Distributed Exploit Protection: Attackers are adept at weaponizing newly published vulnerabilities faster than defenders can patch. With defenders seeing nearly 100 new vulnerabilities every day, according to Cisco Talos Threat Intelligence, this can lead to catastrophic results. Hypershield delivers protection in minutes by automatically testing and deploying compensating controls into the distributed fabric of enforcement points.
• Autonomous Segmentation: Once an attacker is in the network, segmentation is key to stopping their lateral movement. Hypershield perpetually observes, auto-reasons and re-evaluates existing policies to autonomously segment the network, solving this in large and complex environments.
• Self-qualifying Upgrades: Hypershield automates the incredibly laborious and time-consuming process of testing and deploying upgrades once they are ready, leveraging a dual data plane. This completely new software architecture allows software upgrades and policy changes to be placed in a digital twin that tests updates using the customer’s unique combination of traffic, policies and features, then applying those updates with zero downtime.
Built into the Security Cloud, Cisco’s unified, AI-driven, cross-domain security platform, Cisco Hypershield is expected to be Generally Available in August 2024. With Cisco’s recent acquisition of Splunk, customers will gain unparalleled visibility and insights across their entire digital footprint for unprecedented security protection.
“AI is not just a force for good but also a tool used for nefarious purposes, allowing hackers to reverse engineer patches and create exploits in record time. Cisco looks to address an AI enabled problem with an AI solution as Cisco Hypershield aims to tip the scales back in favor of the defender by shielding new vulnerabilities against exploit in minutes – rather than the days, weeks or even months as we wait for patches to actually get deployed,” said Frank Dickson, Group Vice President, Security & Trust at IDC. “With the number of vulnerabilities ever increasing and the time for attackers to exploit them at scale ever decreasing, it’s clear that patching alone can’t keep up. Tools like Hypershield are necessary to combat an increasingly clever malicious cyber adversary.”
“Cisco Hypershield takes aim at the complex security challenges of modern, AI-scale data centers. Cisco’s vision of a self-managing fabric that seamlessly integrates from the network to the endpoint will help redefine what’s possible for security at scale,” said Zeus Kerravala, Founder and Principal Analyst of ZK Research. “For instance, this level of visibility and control across a hyper-distributed environment prevents lateral movement of attackers, enabled through a unique approach to segmentation that’s autonomous and highly effective. While this may seem fantastical, the time is right given recent AI advances combined with the maturity of cloud-native technologies like eBPF.”
“At AHEAD we believe cybersecurity should be integrated into everything we do. Bolted-on security is more expensive and less effective,” said Steven Aiello, Field Chief Information Security Officer at AHEAD. “Cisco Hypershield ensures that cyber protections are included into the fabric of the enterprise. Distributed Exploit Protection will be a massive win for blue teams – legacy synthetic patching was primarily limited to edge devices, allowing lateral movement once an attacker breached the perimeter. It’s a great day for cyber-defenders!”
Tech News
TRENDS IN AI COMPLIANCE INFLUENCING HOW GCC COMPANIES OPERATE

Across the GCC, national growth strategies, with Saudi Arabia’s Vision 2030, the UAE’s National AI Strategy 2031, and Qatar’s national roadmap, place AI at the centre of economic diversification. McKinsey estimates AI adoption at roughly 84% across GCC organisations, with a potential $320 billion economic impact for the Middle East by 2030. As deployment accelerates, regulatory compliance is a defining factor separating ambition from sustainable scale. Shaffra, an AI research and applications company building autonomous AI teams for enterprises and governments, sees six clear shifts reshaping how companies operate.
1. Regulation is accelerating adoption in high-stakes sectors
Government entities, financial services, telecom, aviation, and large semi-government organisations are moving fastest. These sectors operate at scale, face strict efficiency mandates, and function under constant regulatory oversight. Healthcare and energy are advancing more cautiously due to safety and data sensitivity. In many cases, the more regulated the industry, the faster AI deployment progresses. However, rapid scaling also exposes governance weaknesses, particularly where documentation, ownership, and oversight mechanisms are underdeveloped.
2. Compliance is prerequisite for scale
Over the past year, 88% of Middle East CEOs have reported generative AI uptake. Today, organisations increasingly require audit trails, explainability, clear data lineage and residency controls, defined performance thresholds, and enforceable human oversight mechanisms. With one in four Middle East consumers citing privacy as a primary concern, compliance is being treated as a post-deployment validation exercise; it is a structural requirement for scaling AI responsibly.
3. Sovereign AI and data residency are shaping architecture
AI governance in the GCC is being influenced less by standalone AI laws and more by data protection and cybersecurity frameworks. The UAE’s federal data protection law, Saudi Arabia’s PDPL under SDAIA, and Oman’s PDPL reinforce lawful processing and cross-border controls. In highly regulated sectors such as banking, healthcare, energy, and telecommunications, data residency and local control over models are strategic imperatives. Sovereign AI is evolving from a policy ambition into an operational requirement affecting infrastructure, vendor selection, and system design.
4. Human accountability is being reasserted
When organisations deploy AI without defining who owns the decision, when human escalation is required, and what the system is permitted or restricted from doing, they create either over-reliance or under-utilisation. Without clearly defined ownership and documented review controls, accountability weakens and regulatory exposure increases.
For instance, DIFC reinforces responsible AI use in personal data processing. High-impact decisions involving legal standing, fraud, employment, healthcare guidance, or public sector determinations that affect citizens need to involve human oversight, while AI handles speed, consistency, and automation of repetitive tasks. High-impact decisions should involve accountable human oversight.
5. Governance maturity slows deployment activity
Many organisations are AI-active but still developing governance maturity. Common governance gaps are structural rather than technical. Multiple pilots often run in parallel, tool adoption is fragmented, and accountability is split across IT, legal, risk, and business functions. Growing enterprises often lack a central AI governance owner, a comprehensive use-case inventory, consistent vendor and model risk assessment, and formal escalation protocols. Policies may exist at the board level, yet it is not consistently embedded into day-to-day operations. Addressing this gap requires governance to be built into workflows from the outset.
6. Continuous auditing is discipline
Studies indicate that a majority of ML models degrade over time, through model drift, hidden bias, or misuse vulnerabilities. Initial audits frequently reveal undocumented use cases, weak access segmentation, insufficient logging, and unclear review protocols. Effective governance requires compliance with international and local data residency rules, structured risk tiering, data lineage validation, access controls, bias testing, performance benchmarking, and defined incident response procedures. High-impact systems warrant quarterly reviews supported by continuous monitoring, while lower-risk applications still require periodic reassessment. Governance is increasingly measured through evidence rather than policy statements. Boards are asking for dashboards, logs, and audit artefacts — not policy PDFs.
Governance is being considered as part of AI infrastructure. Compliance frameworks are evolving into operational architecture embedded within systems, workflows, and accountability models. The organisations that will lead in the GCC are those that design governance at the same time they design capability, ensuring AI scales with discipline rather than risk.
Tech News
PNY ANNOUNCES STRATEGIC PARTNERSHIP WITH F5 TO ACCELERATE THE ADOPTION OF SECURE, HIGH-PERFORMANCE INFRASTRUCTURE IN EMEA

PNY Technologies, a leading distributor of technology solutions and long-standing NVIDIA partner, today announced a partnership with F5, the global leader in delivering and securing
This agreement aims to strengthen access for enterprises across the EMEA region to advanced solutions designed to optimise, secure, and accelerate applications and IT infrastructures.
As AI adoption continues to accelerate, performance, data flow management, and application security are becoming critical priorities. Through this partnership, the F5 Application Delivery and Security Platform (ADSP) will complement PNY’s AI Factory ecosystem by providing advanced capabilities for traffic management, application security, and performance optimisation across on-premises, cloud, and hybrid environments.
PNY will leverage its technical expertise, partner network, and logistics capabilities to facilitate the deployment of F5 ADSP solutions for enterprises, system integrators, and service providers throughout the region.
“Collaboration between PNY, a specialist distributor of NVIDIA AI Factory solutions across the EMEA region, and F5 represents a major step forward for AI-dedicated infrastructure,” said Laurent Chapoulaud, VP Marketing at PNY. “Together, we optimise GPU environments through accelerated data flows and enhanced application security. This synergy between infrastructure and intelligent traffic management enables the deployment of AI architectures that are high-performance, resilient, and scalable.”
“This partnership brings together complementary strengths that directly benefit our partners and customers,” said Nasser El Abdouli, Regional VP EMEA Channel Sales, F5. “PNY’s longstanding partnership with NVIDIA, combined with F5’s growing AI-focused application delivery and security offerings, allows us to help partners capably respond to the rapidly increasing demand for secure and scalable AI infrastructure across EMEA.”
Through this collaboration, PNY and F5 aim to support enterprises in their strategic initiatives related to hybrid multicloud, cybersecurity, and application performance optimisation, while simplifying access to next-generation technologies.
Tech News
MIDDLE EAST CONFLICT DRIVING A SURGE IN SCAMS, DEEPFAKES, AND GOVERNMENT IMPERSONATION

Cybercriminals don’t wait for the dust to settle. As conflict escalates across the Middle East, a parallel threat has emerged targeting ordinary people through their inboxes and social media feeds.
On 4 March, the UAE Ministry of Interior warned the public about fraudulent emails impersonating government emergency services, falsely claiming that residents must complete a mandatory registration form to receive state support or insurance coverage. The emails bore hallmarks of official government communications, making them convincingly deceptive. They are designed to exploit fear, urgency, and the instinct to comply with perceived authority. These messages are already circulating.
Alongside financial scams, verified fact-checkers have identified AI-generated and mislabelled footage circulating online as supposed evidence of attacks in the UAE. This includes video from Bahrain that was picked up by international media outlets and incorrectly broadcast as a Dubai drone strike. Fabricated videos of the Burj Khalifa collapsing, AI-generated missile strike imagery, and decade-old footage repackaged as current events have also circulated widely. In another example, a supposed “before and after” satellite image of Dubai showing smoke rising over the city was mislabelled — the image was actually from Sharjah, the neighbouring emirate. In many cases, the content spread faster than the corrections. Dubai Police have warned that sharing unverified information can carry criminal penalties under UAE law, including fines of no less than AED 200,000. Despite these warnings, the flow of misleading content has not slowed.
KnowBe4 warns patterns observed during previous conflicts and crises, including the war in Ukraine and the COVID-19 pandemic, the public should also expect charity and donation scams exploiting humanitarian concern, phishing emails disguised as embassy or government alerts, and deepfake imagery engineered to provoke fear or spread disinformation.
Dr. Martin Kraemer, CISO Advisor at KnowBe4 said, “Crises are the most reliable recruitment tool bad actors have. When people are frightened and searching for information, they are not necessarily looking for the truth. They are looking for confirmation of what they already fear. That is exactly what scammers and disinformation actors exploit. What we are seeing right now, fake government emergency emails, mislabelled footage, AI-generated imagery, is not random. It is targeted, and it is designed to exploit the gap between what people feel and what they know. The antidote is not panic. It is discipline: pause, question the source, and go directly to official channels before acting on anything. That’s precisely how governments and organizations are educating people to react in stressful situations.”
What the Public Can Do Right Now
KnowBe4 urges residents, travellers, and anyone following events in the region to apply the following principles:
- Treat urgency as a warning sign. Any message that pressures you to act quickly, register now, donate immediately, confirm your details before midnight, is likely designed to stop you thinking clearly.
- Verify before you share. Before forwarding footage or information, check whether it has been verified by a reputable news outlet or official source. Reverse image searches take seconds and can prevent significant harm.
- Go directly to official sources. If you receive communications claiming to be from a government ministry, embassy, or emergency service, navigate directly to their official website rather than clicking any link in the message.
- Question what you see. AI-generated imagery has reached a level of quality where video alone is no longer reliable evidence. Look for verification from multiple credible sources before drawing conclusions.
- Report suspicious communications. In the UAE, suspected scam emails or messages should be reported to the relevant authorities. Do not engage with the sender.
-
News10 years ago
SENDQUICK (TALARIAX) INTRODUCES SQOOPE – THE BREAKTHROUGH IN MOBILE MESSAGING
-
Tech News2 years agoDenodo Bolsters Executive Team by Hiring Christophe Culine as its Chief Revenue Officer
-
VAR11 months agoMicrosoft Launches New Surface Copilot+ PCs for Business
-
Tech Interviews2 years agoNavigating the Cybersecurity Landscape in Hybrid Work Environments
-
Tech News8 months agoNothing Launches flagship Nothing Phone (3) and Headphone (1) in theme with the Iconic Museum of the Future in Dubai
-
Automotive1 year agoAGMC Launches the RIDDARA RD6 High Performance Fully Electric 4×4 Pickup
-
VAR2 years agoSamsung Galaxy Z Fold6 vs Google Pixel 9 Pro Fold: Clash Of The Folding Phenoms
-
Trending5 months agoOPPO A6 Pro 5G Review: Reliable Daily Driver


