Connect with us

Tech News

RACE Model: Building Cyber Resiliency and Mitigating Network Risks by Going Back to Basics

Published

on

HUAWEI CYBERSECURITY

By H.E. Dr. Mohamad Al Kuwaiti, Head of Cybersecurity, UAE Government, and Dr. Aloysius Cheang, Chief Security Officer, Huawei Middle East & Central Asia

Jim Rohn once famously said, “Without a sense of urgency, desire loses its value.” Resilience is key to surviving in today’s world full of emerging technologies and hot-button buzzwords. It is a race towards all that is good, towards cyber survivability, a race of the utmost urgency and importance. As such, cybersecurity and, in particular, cyber resiliency is more than just having an incident response plan or a computer security policy. It is about ensuring that your entire security posture can withstand a wide range of threats, which includes hybrid, blended attack vectors that can transcend time and space through the interplay of physical, cyber, and virtual planes that take apart traditional brick-and-mortar aspects of any organizations and cross-borders jurisdiction.

Hence, we need to design a more holistic security framework by integrating cyber and physical security measures, hardening critical systems, and creating cross-functional teams and multi-disciplinary teams that will involve team members not only from our own organization but also from other stakeholders in our ecosystem that can address risks from multiple angles. Indeed, designing an auto-adaptable, self-evolving security framework that will evolve alongside the volatile and rapidly evolving threat landscape will be crucial to maintaining cyber resiliency and, therefore, safeguarding the business in the new intelligent era. But, without a doubt, there’s an urgent need to prioritize building cyber resiliency above all other matters.

Leonardo Da Vinci said, “I have been impressed with the urgency of doing. Knowing is not enough. We must apply. Being willing is not enough. We must do.”  To build resilience, having a lofty mission statement with an ambitious plan is definitely not enough; the efforts must be grounded in the practicality of getting our hands dirty and being able to paddle in and out of the mudflats regardless of how much the mud will engulf you.

Figure 1 shows our proposed RACE model as a simple four-part process to look at how organizations can build cyber-resiliency with a feasible and actionable plan to achieve our objective of securing any organization by going back to basics. By going back to basics and doing them well, it will at least address 90% of the problems that most organizations are facing today. The solution needs not to be complex nor flamboyant; it just needs to be practical, and if one can cut through the levels of complexity and zero in on the crux of the problem and put in place basic security controls that are effective and efficient, it will lay the groundwork for success.

Borrowing the analogy of racing, would you be driving a race car that has a manual gearbox for full control and is tuned for the race track, or would you just take any car straight from the garage untuned for the conditions of the race track and relying on the car’s automatic gearbox to take care of the driving? Thus, it is clear that returning to basics and tuning your security measures for accuracy and precision is a much better bet than pouring huge investments into advanced systems and mechanics, building layers and layers of security indiscriminately.

Being accurate and precise will enable us to build quantifiability into our cybersecurity program. Accuracy and precision are both ways to measure results. Accuracy measures how close results are to the true or known value, while precision, on the other hand, measures how close results are to one another or, in other words, how well our defenses are designed and executed. This is our motivation behind the development of the RACE model. The subsequent paragraph will describe each key component of the model in greater detail.

Figure 1: The RACE model, a simple 4-part plan for building cyber resilience

Firstly, resiliency in modern cybersecurity speaks to the capability to provide value for the customer. In simplistic terms, it is to provide robustness and survivability of the organization’s cyber footprint in the face of adversaries and threats, meet compliance needs for business governance while excelling and providing a competitive advantage, using whatever security capabilities are based on established best practices, processes, and frameworks that achieve repeatable results. Figure 2 below summarizes what it takes to build cyber resilience and the value it brings to the table, taking into consideration the interplay between being compliance and building capabilities to support the resiliency of the entire information infrastructure that supports the business of an organization.

Figure 2: Building trust, enhancing cyber resilience, and mitigating risks in action

Next, awareness refers not only to imbuing a culture of cybersecurity among all the staff in an organization to the extent that basic cyber hygiene can be practiced but also to targeting the team focusing on delivery and maintaining ICT and security services within the organization so that they pay attention to cementing their core competencies and fundamentals. Hereby, it is recommended that harnessing risks and hedging your bet against the barrage of threats based on a risk-based approach is the best way, given that resources on hand are always scarce, limited, and, to some extent, expensive. Given that is the case, we have identified five basic core fundamentals that every cybersecurity team in any organization needs to build up on their basics (and manage them well) based on common cybersecurity issues faced, as depicted in Figure 3. While it may seem simple, the devil is always in the details to ensure a job is done well.

Figure 3: Managing five common risks (end-to-end) comprehensively as a basis for building cyber resilience

One man, organization, or country cannot resolve cybersecurity issues alone. It takes an entire village to address cybersecurity issues as they affect everyone if anything goes awry. Cybersecurity is a team sport, and all the stakeholders within the ecosystem must contribute towards addressing the elephant in the room, as shown in Figure 4. We always find strength in numbers because “united we stand, divided we fall.” We see the Blackhat community is doing that exactly, and that is why they are always a step ahead of the good guys every time, thereby summarizing the urgency to Collaborate as a key differentiating measure.

 Figure 4: Cybersecurity is a team sport. So, who is on the team?

Last but not least, we need to bring everything together to build or Engineer the process, putting the cogwheels into their rightful places to drive the engine forward. We have identified five key fundamental security measures that, if done diligently, will be key to building an end-to-end resilient system and reducing network risks. 

As shown in Figure 3, the five key fundamental security measures are 1) software integrity protection, 2) security configuration, 3) digital certification management, 4) vulnerability remediation, and 5) product lifecycle management. Take “Security configuration” as an example. To engineer and address the risk brought about by system misconfiguration, we need to break it down into its elements or identify its Work Breakdown Structure or WBS, which is a key step for planning project tasks and allocating resources.

Figure 5: Security Configuration Example: Optimize the Security Configuration Baseline based on Service Scenarios

Figure 5 summarizes typical work done to break down “security configuration” into its WBS. While this figure does not depict the complete picture, it does show a deep dive into each piece of work. One should keep working on breaking it down until the project scope and all the tasks required to complete the project can be visualized in one snapshot.

In conclusion, we have distilled the entire RACE model in detail in this paper. Achieving RACE is key to building resiliency for any organization. The important thing to note is to keep it simple and go back to basics. Build an auto-evolving, adaptable security framework based on the strategy that is designed to shape-shift alongside emerging blended, hybrid threats by leveraging on actionable intelligence, building resilience, and fostering collaboration so that individuals, organizations, and nations. Establishing public-private partnerships (PPP) with governmental entities and authorities enables public sector players, such as the UAE Cyber Security Council, to act as the fulcrum for coordinating and pooling resources and intelligence. This will enable our modern society to defend against today’s threat and safeguard one’s digital journey by addressing the challenges of tomorrow’s Age of Intelligence.

Tech News

New Rubrik Agent Cloud Accelerates Trusted Enterprise AI Agent Deployments

Published

on

New Rubrik Agent Cloud Accelerates Trusted Enterprise AI Agent Deployments

AI agents represent the biggest opportunity and the biggest threat to organizations everywhere. Rubrik, Inc., the Security and AI Operations Company, today announced the launch of the Rubrik Agent Cloud to accelerate enterprise AI agent adoption while managing risk of AI deployments.

AI transformation is now mandatory for most organizations. However, IT leaders are constrained because Agentic AI has significant risks including hallucination as well as compromise by threat actors. Rubrik Agent Cloud is designed to monitor and audit agentic actions, enforce real-time guardrails for agentic changes, fine-tune agents for accuracy and, finally, undo agent mistakes. Built on the Rubrik Platform that uniquely combines data, identity and application contexts, Rubrik Agent Cloud gives customers security, accuracy, and efficiency as they transform their organizations into AI enterprises.

“IT and security leaders often don’t know what their AI agents are doing or how to undo their mistakes. Rubrik wants to help them answer: ‘What agents do I have?’ ‘What are they capable of doing?’ ‘How are they performing?’ ‘What did they do?’ and ‘Can I undo that when they screw up?’ said Bipul Sinha, CEO, Chairman, and Co-Founder of Rubrik. “AI agents have the potential to cause 10x the damage in 1/10 of the time. With Rubrik Agent Cloud, we uniquely address this challenge by leveraging our leadership in data, identity, and resilience to help our customers deploy AI agents with peace of mind.”

Accelerate Enterprise AI Deployment and Resilience 

Rubrik Agent Cloud will offer comprehensive agent management capabilities that encompass the entire AI agent lifecycle – from observability and control to performance management and simulation. 

  • Agent Monitor:
    • Auto-discovers both infrastructure-as-a-service (Azure/AWS) agents as well as platform-as-a-service (M365/AgentForce) agents. 

○ Automatically discovers and maps active agents across popular agent builders such as OpenAI, Microsoft Copilot Studio, Amazon Bedrock and other popular agent building tools. 

○ Continuously monitors agent activity and data access, and maintains immutable audit trails capturing context from data, identity, and applications. 

  • Agent Govern:
    • Tracks agent usage, evaluates performance against prompts, and gives teams the tools to control destructive/undesired actions.

○ Defines and enforces agent behavior, access, and action policies in real-time. 

○ A centralized tool to provide integration with enterprise identity systems—helping ensure secure, compliant, and controlled innovation.

  • Agent Remediate:
    • Announced in August 2025, Agent Rewind integrates with Rubrik Security Cloud to provide the industry’s only solution for precise time and blast radius rollback of undesirable or destructive actions.

○ Goes beyond observability to allow organizations to instantly undo unwanted or destructive actions, without any downtime or data loss. 

○ Selective rollback of agent-driven changes ensures continuous protection for critical data and systems, and immutable recovery.

Continue Reading

Tech News

UAE’s AI market set to soar to Dh170 billion by 2030, driving MENA’s Dh610 billion Artificial Intelligence boom

Published

on

UAE’s AI market set to soar to Dh170 billion by 2030, driving MENA’s Dh610 billion Artificial Intelligence boom

The UAE’s Artificial Intelligence (AI) market is forecast to hit Dh170 billion (USD 46.33 billion) by 2030, according to new data from Grand View Research (GVR) in a study that underscores the country’s accelerating dominance in the region’s USD 166 billion (Dh610 billion) AI boom.

Close on the heels of the UAE unveiling its first Arabic-language AI model earlier this year, the new research by the California headquartered- firm reveals that the MENA AI market, valued at USD 11.92 billion (Dh43.7 billion) in 2023, is set to expand almost fifteen-fold to USD 166.33 billion (Dh610 billion) by 2030, growing at an annual rate of 44.8 percent.

“The Middle East, and especially the UAE, is no longer just an adopter of global AI technologies – it’s, in fact, shaping its own playbook,” said Swayam Dash, Managing Director at Grand View Research. “With sovereign funds backing innovation, and policies like the UAE’s new Strategic Plan 2031 leading the way with focus on utilising artificial intellegence in achieving greater financial efficiency for the federal government, the region is becoming a laboratory for how AI can drive both governance and growth.”

GVR’s report further highlights that nearly three in four UAE companies have maintained or increased their AI investments in the past year. Machine learning and deep learning remain the backbone of this transformation, particularly in healthcare, logistics, and financial services.

According to the report, the AI in Healthcare market in the Middle East and Africa, valued at USD 193.1 million (Dh 709 million) in 2023, is projected to reach USD 1.47 billion (Dh 5.39 billion) by 2030 growing at a CAGR of 33.6 per cent, while the region’s legal AI sector – currently at USD 43.3 million (Dh 159 million) – is expected to almost triple to USD 121.5 million (Dh 446 million) at a CAGR of 18 per cent over the same period.

“The release of region-specific AI metrics for the first time quantifies what many have sensed – that the UAE and its neighbours are at the tipping point of a generational transformation,” Dash added. “And the next wave of opportunity will come from specialisation. Sectors like healthcare and legal technology are still emerging here and hence the potential is immense. With the AI in regional healthcare market alone projected to touch USD 8.39 billion (AED 30.8 billion) by 2033, we’re looking at a decade of exponential growth. Likewise, the legal AI space, though currently small, represents a first-mover opportunity in digitising governance, compliance, and regulatory frameworks – areas where the Middle East can define its own benchmarks rather than follow global ones.”

The study also notes how the MENA region is further emerging stronger as one of the world’s most dynamic AI frontiers driven particularly by government-led digital transformation agendas, rapid urbanisation, and the rollout of AI-enabling technologies such as 5G, cloud, and IoT,

“Machine learning and deep learning continue to dominate adoption across smart-city initiatives, healthcare, and urban management ­– with the UAE leading the charge in real-world integration,” said Dash.

The full Grand View Research MENA AI Market Report offers an in-depth analysis of these evolving trends, uncovering how data, policy, and innovation are converging to redefine the region’s digital economy.

Continue Reading

Tech News

FVC and SearchInform Join Forces to Boost Insider Threat Prevention and Data Protection in MENA

Published

on

FVC and SearchInform Join Forces to Boost Insider Threat Prevention and Data Protection in MENA

FVC, a prominent distributor specialising in innovative technology solutions, is pleased to announce its strategic partnership with SearchInform, a leader in information security and insider threat prevention solutions. Together, they are committed to strengthening organizations’ defenses against data leaks, corporate fraud, human-factor related risks.

K.S. Parag, Managing Director, FVC:

“We are excited to welcome SearchInform to our cybersecurity portfolio. The company offers the most powerful and localized DLP on the MENA market. SearchInform solution stands out from the competition due to a number of advantages. The system can be deployed within a few hours, protects the maximum number of data transfer channels, provides smart content-based blocking for all controlled channels and also use digital watermarks to trace the source of potential leaks. SearchInform DLP supports analysis of data in Arabic and has security policies, tailored for requirements of local organizations, enabling timely detection and prevention of confidential data leaks. The solution leverages AI to monitor atypical data transfer channels, recognize graphic elements, transcribe audio into text, detect attempts to photograph PC screens with smartphones.”

SearchInform offers a range of products, including DCAP, DLP, and SIEM. All the tools are seamlessly integrated. Technical support is provided through a specialist assigned to the company, who has extensive experience thanks to clients from various fields.

Commenting on the Partnership, Artem Volodin, CEO SearchInform MENA, stated:

“We are proud to collaborate with FVC, whose expertise in the Middle Eastern market will strengthen our efforts to combat insider threats and data leaks. The region needs a comprehensive solution that will enable organizations to meet regulatory standards, including SAMA, PDPL, DCC, ECC, UAE Information Assurance (IA) Regulation etc. and global ones, such as GDPR, PCI DSS. SearchInform delivers tools for data protection and risk mitigation across all levels: FileAuditor secures file systems, DLP covers workstations and human risks, Risk Monitor addresses corporate fraud, and SIEM protects IT infrastructure.”

The partners are currently conducting expert training, partner enablement sessions, and are also negotiating the implementation of SearchInform products in local companies.

Continue Reading

Trending

Copyright © 2023 | The Integrator