Connect with us

Features

Robust patch management. In the fight against ransomware, it’s time to get back to basics

Published

on

ransomware

By Saeed Abbasi, Product Manager, Vulnerability Research, Qualys Threat Research Unit (TRU)

In the Arab Gulf region, ransomware has become an epidemic. Since 2019, Saudi Arabia has been a top target for RansomOps gangs. And the GCC remained the most affected territory in the Middle East and Africa, as of 2023, showing a 65% increase over 2022 for instances of victims’ information being posted to data-leak sites. According to the Known Exploited Vulnerabilities (KEV) catalog, maintained by the Cybersecurity and Infrastructure Security Agency (CISA) under the U.S. Department of Homeland Security, approximately 20% of the 1,117 exploited vulnerabilities are linked to known ransomware campaigns. Attackers have become more relentless and more sophisticated, just as regional security teams have become more overworked and overwhelmed by their new hybrid infrastructures.

In today’s climate, senior executives approach discussions about cyber risk with the expectation of hearing unfavorable news. Indeed, matters have escalated of late with the emergence of human-mimicking AI. We used to take comfort in the fact that at least artificial intelligence could not be creative like people could. But that was before generative AI came along and left us speechless — with delight or dread, depending on our day job. For security professionals, it is the latter because every new technology that arrives will eventually get exploited by threat actors. AI and its generative subspecies can make it easier to find vulnerabilities, which implies there will be a surge in the volume of zero-days. And GenAI can pump out convincing phishing content at a scale unreachable by human criminals.

But in a break with tradition, I offer good news. In the daily struggle with ransomware threats, the answer lies in the daily fundamentals of IT admin. Patch management is the keystone of cyber resilience. As each vulnerability becomes known and fixes are released, that dreaded countdown begins again. Whether threat actors have beaten vendors to the punch by publishing an exploit before the patch was released or not, organizations must be prepared to act strategically when fixes become available. It may be that a patch fixes an error that poses no risk to the enterprise, in which case patching would not have much impact on reducing cyber risk. Hence, organizations need to look at prioritizing patching the assets that cause the most existential risk to the company, maximizing their patch rate (a measure of how effectively vulnerabilities are addressed) and minimizing their mean time to remediation (MTTR) for such “crown jewel” assets.

Windows mean doors

The Qualys Threat Research Unit (TRU) uses these metrics often in anonymized studies of organizations’ cyber-readiness. Our 2023 Qualys TruRisk Research Report found that weaponized vulnerabilities are patched within 30.6 days in 57.7% of cases, whereas attackers typically publish exploits for the same flaws inside just 19.5 days. That 11-day window is where our concerns should be concentrated. It should spur us to revisit patch management and — if we have not already — to integrate it into our cybersecurity strategy so we can start to close our open doors to attackers.

If we imagine a graph of MTTR plotted against patch rate for every vulnerability, then we can imagine four quadrants, defined by combinations of “high” or “low” for our two metrics. Our sweet spot is in the bottom righthand corner, where patch rate is high and MTTR is low. We could call this quadrant, the “Optimal Security Zone”. If a vulnerability is in this zone, we are unfazed by it. It is low-risk because it is patched and resolved quickly. In the top right, we find that patch rate is still high, so we call this the “Vigilant Alert Zone”, but incidents take a longer time to remediate (high MTTR). But while this is a higher source of concern, it is less worrying than if a vulnerability falls in the bottom left quadrant — the “Underestimated Risk Zone”. Here, we find overlooked vulnerabilities (low patch rates) but unexpectedly short remediation times. These flaws can quickly become risks if left unaddressed. Finally, we come to our red-flag quadrant, the “Critical Attention Zone” (top left), where vulnerabilities have low patch rates and take a long time to resolve.

Combining metrics like this can give us important crossover information that allows us to triage our patch management effectively. By exploring the critical areas first, we can examine overlooked vulnerabilities and discover either that they pose little threat and are less of a source of concern, or that they could lead to a ransomware incident, in which case they become a top priority on our to-do list. With RansomOps groups now leveraging advanced automation tools, the importance of optimal patch management cannot be overstated. Ensuring that systems are updated and secure is critical to prevent potential vulnerabilities.

Action stations

Starting today, then, GCC organizations should look to their vulnerability management strategy and determine an approach that is able to stand up to armies of threat actors, working as a unified industry, equipped with advanced AI, to disrupt, disable, and damage the region’s innovative spirit. We all need to make sure that our vulnerability gaps are closed and our defenses tightened against these malicious actors. Technical and business stakeholders must collaborate on crafting roadmaps that make sense to their operational uniqueness.

The hope remains that one day, cyber criminals, a persistent threat today, will be effectively countered by innovative security technologies. However, we must confront the fact that attackers are becoming more sophisticated, their campaigns are escalating in scope, and the resources available for cybersecurity defense are often constrained.

The solution does not lie in an unknowable panacea, but in the day-to-day fundamentals — robust patch management that uses the four-quadrant principle and aims for the highest possible patch rate and the shortest possible resolution time. The top practitioners in any field — sports, business, the arts — will always extol the virtues of the fundamentals. If it works for them, then why not for us? So, let’s get back to basics and send the ransomware actor packing.

Features

Cash and Its Persistent Meaning

Published

on

digital payments

Authored by: Konstantin Vladimirovich Tserazov

In recent years, the global shift towards digital payments has been evident. More countries are witnessing a decline in cash transactions, with Gulf countries upholding this trend. By the end of this year, over half of all financial interactions in this region are expected to be cashless. Despite this tendency, cash remains in the pockets of millions of people, and this phenomenon can’t be ignored.

The Evolution of Money

Before money existed, bartering was used, but it was inefficient. As a result, mediums of exchange were created, beginning with items like shells, which later developed into metals, coins, and eventually banknotes. While this shift towards digital payments offers convenience and efficiency, it also creates challenges for certain groups in any society, such as the elderly, minors, and individuals with disabilities. Even in the face of digitalization, cash remains important for those who cannot access banking services, such as temporary migrants. Unfortunately, these groups face a risk of digital exclusion.

The Cash Dilemma

In some countries, the demand for cash increases even as cash payments decline. This can be explained by the fact that cash is used sometimes as a preferred savings method, especially during times of crisis.

The push towards cashless and digital payments is driving a reduction in physical bank branches, encouraging the transition to digital money.

However, this transition faces several obstacles:

  • High Cost of Smartphones: Not everyone can afford a smartphone, which is crucial for conducting digital transactions.
  • Unreliable Internet Access: Consistent Internet connectivity is necessary for digital payments, yet it is not universally accessible.
  • Challenges for Older Adults: Seniors may struggle to adapt to digital payment systems.
  • Fraud Risk: Ease of transfer increases fraud risk, especially for vulnerable groups.
  • No Local CBDCs: Many countries lack central bank digital currencies (CBDCs).
  • Unclear Crypto Laws: Cryptocurrency laws are often unclear or restrictive.

Cryptocurrency as a Potential Solution

Cryptocurrencies could potentially address some of these challenges, but it is essential to ensure that the development of CBDCs and the broader crypto ecosystem includes applications for the deaf, blind, or visually impaired, as well as individuals with developmental disabilities.

This area currently receives little attention in the crypto sphere but holds the potential for successful business models and innovative solutions for millions of people. Ultimately, these solutions will contribute to the adoption of digital means of financial interaction.

The Necessity of Digitization

The move towards digitization aligns with the Environmental, Social, and Governance (ESG) agenda for money emission. Managing cash incurs costs for the state, and a digital system should be significantly more efficient than handling physical cash, which requires transport and management. The marginal cost per transaction would be very low if the central bank provided a digital payment system.

Moreover, if CBDCs were interest-bearing, they could theoretically impact monetary policy quicker. This would make it more advantageous to hold money in CBDCs rather than cash, which does not generate income.

Digital Money as a Tool for Inflation Management

When high interest rates are necessary to curb inflation, digital money could become a silver bullet. The circulation of such financial instruments reduces business costs, allowing them to raise prices less.

In short, the distribution of CBDCs could be as effective a tool for central banks in managing inflation as increasing key interest rates and tightening reserve requirements for banking activities. Unlike cash, where it is unclear what goods are being purchased at any given moment, CBDCs provide for monetary policy makers transparency in transactions .

Why People Still Prefer Cash

Despite the advantages of digital payments, many people still prefer cash. This preference can be traced back to when dollars had guaranteed gold backing. When thinking about digital currencies and cryptocurrencies, some feel they are “somehow out of thin air,” not backed by anything.

In reality, current fiat currencies are also not backed by anything. However, cryptocurrencies like Bitcoin have a guaranteed reduction in the rate of issuance and a “cap” on the maximum number of units that can be issued, unlike any fiat currency.

The inflationary nature of fiat encourages even those who save in cash to spend it. If a person saves in Bitcoin, there are no such incentives; due to its deflationary model, there is a high likelihood of further increases in the value of such cryptocurrency relative to fiat money. This is precisely why the adoption of Bitcoin as a means of payment is stagnating — in El Salvador, for example, despite the ability to pay with Bitcoin in stores, there is no significant enthusiasm.

Another interesting point about why people prefer cash is the relative anonymity of spending. Additionally, there is the feeling of control. In some countries, there is a strong fear that hard-earned money in banks could disappear during a financial crisis. The Cypriot banking debacle of 2012-2013 serves as a chilling reminder. Billions of euros—a staggering €8 billion—were simply wiped out, leaving depositors high and dry. Fast forward a decade, and a glimmer of hope emerged: last year a Cypriot court ordered the government to make amends to one unlucky depositor. But whether this lone victory will set a precedent for broader compensation remains a major question mark.

The Convenience of Cash

There are many instances where, if you travel to another country, you can often pay with your home country’s bank card. However, the exchange rate is a significant question. Additionally, there are built-in fees. In some cases, carrying cash from your home country and exchanging it locally can be more beneficial than using a card or ATM.

Sure, digital payments are all the rage, but cash still holds its own. It’s secure and private and gives you a sense of control. If we go completely cashless, some people will get left behind. We need to embrace the new while still holding onto the old. That’s how we build a financial system that works for everyone.

Continue Reading

Features

Paving the Way for AI Success in Business

Published

on

AI in business

By Karim Azar, Regional Vice President – Middle East & Turkey, Cloudera

The digital landscape is evolving at an unprecedented pace, and at the heart of this evolution lies the transformative potential of artificial intelligence (AI). Across industries, AI is not merely a buzzword but a revolutionary force driving innovation, efficiency, and growth. Its impact extends beyond automation, touching every side of business operations and decision-making. It can revolutionize multiple sectors and fundamentally reshape the corporate industry.

Nonetheless, challenges arise with technological evolution, particularly in accessing and overseeing varied datasets across diverse environments. These challenges frequently act as obstacles to achieving successful AI implementation. In response to these challenges, the technology landscape is witnessing significant advancements in open data lakehouse technologies, providing a robust foundation for AI and analytics. Let’s delve into key technological developments and their advantages, focusing on the broader implications rather than specific products.

Unlocking Business Potential

AI has the potential to unleash new opportunities for businesses. McKinsey’s findings reveal that more than 62% of companies in the Gulf Cooperation Council (GCC) region currently utilize Generative AI in some operational aspect. The research underscores the substantial potential of AI to create tangible value in the GCC, with an estimated value of up to $150 billion.

This adoption trend is not without merit; statistics show that 83% of businesses adopting AI report substantial (30%) or moderate (53%) benefits. AI can address various challenges by providing predictive analytics and personalized customer experiences, enabling organizations to make faster and more accurate data-driven decisions.

Despite the obstacles in adopting AI, such as data management complexities and security concerns, offering air-gapped deployment for large language models (LLMs) is still a viable option. This feature boosts security, data privacy, and performance while also lowering customer operational expenses. However, overcoming these challenges requires more than just technological solutions. It demands a comprehensive approach that includes robust data governance frameworks, continuous employee training programs, and collaboration with regulatory bodies to ensure compliance with data protection laws.

AI Across Industries

AI is not a one-size-fits-all solution. It is applied differently across industries and business functions, including healthcare, finance, manufacturing, and retail. The potential uses of AI are vast, from boosting supply chain efficiency to transforming healthcare outcomes and customer service.

For example, in the healthcare industry, AI-powered predictive analytics can help doctors identify patients at high risk of developing certain diseases, allowing for early intervention and personalized treatment plans. AI algorithms can analyze market trends and financial customer behavior to recommend customized investment strategies. In manufacturing, AI-driven predictive maintenance can proactively anticipate equipment failures and schedule maintenance activities, minimizing downtime and reducing costs.

As businesses increasingly adopt AI, they invest in their organization’s future. By promoting innovation and agility, companies can leverage AI to maintain competitiveness in a digital era. Prioritizing data privacy and security helps build trust with customers and stakeholders, ensuring AI technologies’ responsible and ethical use.

AI is a significant transformation in how businesses function and innovate. Embracing AI opens up vast opportunities for organizations to reshape their operations, stimulate growth, and influence the future of business. While the journey may present challenges, the potential benefits are boundless for those willing to embrace the power of AI.

Continue Reading

Features

Smart Cities and the Rise of Intelligent Transportation Systems: Exploring the Benefits and Risks of Vehicle Surveillance

Published

on

By: Dr Ryad Soobhany, Associate Professor, School of Mathematical & Computer Sciences, Heriot-Watt University Dubai

Intelligent Transportation Systems (ITS) have emerged as a transformative solution in urban areas, tackling challenges such as high traffic and pollution. These systems, incorporating a network of static and mobile sensors, including cameras on buildings or vehicles/drones, embedded in the smart city infrastructure, are revolutionizing traffic management. By harnessing data from cameras, in-vehicle GPS systems, in-vehicle Near Field Communication (NFC), IoT devices, and Artificial Intelligence (AI), ITS enable the monitoring and tracking of vehicles for Intelligent Traffic Management Systems (ITMS) or Public Transportation Management Systems (PTMS).

While intelligent transportation systems offer significant benefits, it’s crucial to acknowledge the challenges and risks they pose. ITMS provides real-time monitoring of traffic on roads and at junctions, while PTMS focus on managing transportation fleet and passenger information services. Emergency Response Management Systems (ERMS) primarily monitor the emergency responders of the smart city. The use of intelligent vehicle surveillance systems improves traffic management, public safety, and urban planning, but it also raises concerns about the data privacy and security of users and infrastructure, a risk that must be carefully managed.

Benefits

There are several benefits from the implementation of vehicle surveillance systems in urban areas and the most obvious one is a better vehicle traffic flow by using ITMS. Cameras placed strategically across the city monitor traffic to identify congested areas and road traffic incidents (e.g. accidents). Implementing dynamic traffic lights systems at junctions and temporary speed limits can improve traffic flow. Using AI, predictive traffic routing forecasts traffic bottlenecks and suggests alternative routing.  The use of PTMS leads to enhanced scheduling of public transportation; for example, the arrival/departure of trains/metro at the station is synchronized to feeder buses or taxis being stationed outside the station. There is an improvement in customer satisfaction and journey planning with real-time updates for public transport. Traffic flow is also improved by monitoring of cycle and pedestrian lanes, where safer cycle lanes will encourage road users to adopt cycling in certain urban areas adapted for cycling.

There is an overall improvement in public safety by better traffic management, with better response time to emergency situations by the ERMS, such as ambulances. LPR/ANPR (Licence Plate Recognition/Automatic Number Plate Recognition systems and GPS tracking systems in cars allow the monitoring of vehicles while they are located withing the bounds of the smart city. Stolen or wanted vehicles can be detected and followed through the city. The use of surveillance cameras, LPR/ANPR systems and GPS tracking can improve identification of criminal activities, which should enhance the response of law enforcement. Under-Vehicle Surveillance Systems (UVSS), which are cameras placed at strategic places on roads in the city take pictures or videos of the underside of vehicles to check the chassis for stolen cars. UVSS can also be used to detect contraband at ports or entry/exit points in smart cities.

The use of LPR/ANPR systems ease the management of Low Emission zones, which are areas where low emission vehicles (e.g. electric or hybrid vehicles) can circulate without charges and vehicles with higher emission rates have to pay an hourly or daily charge. The implementation of Low Emission zones can bring environmental benefits. The improved traffic flow in the urban areas can also lead to environmental benefits with less emissions in traffic jams and long traffic queues at junctions. Apart from environmental benefits, there are economic benefits linked to better health and overall happiness of citizens and visitors.

Risks

Several risks are associated with the amount of data collected from the vehicle surveillance systems. The main concern is the privacy of the smart city’s car drivers and car owners. Vehicles and their drivers are tracked everywhere they travel around the city and the speed they travel. This can lead to tracking drivers and without proper legal frameworks, the data collected can be used to encroach on the users’ privacy. The large amount of collected and stored data can be quite attractive to cyber criminals and might lead to cyber-attacks. Any data breach from these attacks might expose the personal information of drivers and their vehicles. Cyber-criminals can target the surveillance systems, for example hacking the intelligent dynamic traffic speed system and changing the traffic speed around the city.

Having video surveillance around the urban areas recording the public can lead to ethical issues. Most of the time, drivers might not have provided informed consent to participate in the vehicle surveillance systems. The lack of consent from users can lead to non-compliance with regulatory bodies and can result in legal challenges from user groups. Users need to be made aware that they are entering a vehicle surveillance zone and their data might be recorded. Vehicle surveillance systems can be used to discriminate against certain sections of the community, for example, young drivers might be unfairly targeted by the vehicle surveillance systems because they allegedly drive fast and dangerously, which allegedly cause accidents. Any cyber security attack or data intrusion can lead to users losing trust in the vehicle surveillance system.

The use of vehicle surveillance systems can benefit smart cities and enhance the quality of life of residents and visitors, but the authorities must respect the personal privacy of the public by ensuring that data are collected and processed ethically and guarded against any cyber-attack. Security policies and mitigation plans are primordial for vehicle surveillance systems.

Continue Reading

Trending

Please enable JavaScript in your browser to complete this form.

Copyright © 2023 | The Integrator