Tech News
RACE Model: Building Cyber Resiliency and Mitigating Network Risks by Going Back to Basics
By H.E. Dr. Mohamad Al Kuwaiti, Head of Cybersecurity, UAE Government, and Dr. Aloysius Cheang, Chief Security Officer, Huawei Middle East & Central Asia

Jim Rohn once famously said, “Without a sense of urgency, desire loses its value.” Resilience is key to surviving in today’s world full of emerging technologies and hot-button buzzwords. It is a race towards all that is good, towards cyber survivability, a race of the utmost urgency and importance. As such, cybersecurity and, in particular, cyber resiliency is more than just having an incident response plan or a computer security policy. It is about ensuring that your entire security posture can withstand a wide range of threats, which includes hybrid, blended attack vectors that can transcend time and space through the interplay of physical, cyber, and virtual planes that take apart traditional brick-and-mortar aspects of any organizations and cross-borders jurisdiction.
Hence, we need to design a more holistic security framework by integrating cyber and physical security measures, hardening critical systems, and creating cross-functional teams and multi-disciplinary teams that will involve team members not only from our own organization but also from other stakeholders in our ecosystem that can address risks from multiple angles. Indeed, designing an auto-adaptable, self-evolving security framework that will evolve alongside the volatile and rapidly evolving threat landscape will be crucial to maintaining cyber resiliency and, therefore, safeguarding the business in the new intelligent era. But, without a doubt, there’s an urgent need to prioritize building cyber resiliency above all other matters.
Leonardo Da Vinci said, “I have been impressed with the urgency of doing. Knowing is not enough. We must apply. Being willing is not enough. We must do.” To build resilience, having a lofty mission statement with an ambitious plan is definitely not enough; the efforts must be grounded in the practicality of getting our hands dirty and being able to paddle in and out of the mudflats regardless of how much the mud will engulf you.
Figure 1 shows our proposed RACE model as a simple four-part process to look at how organizations can build cyber-resiliency with a feasible and actionable plan to achieve our objective of securing any organization by going back to basics. By going back to basics and doing them well, it will at least address 90% of the problems that most organizations are facing today. The solution needs not to be complex nor flamboyant; it just needs to be practical, and if one can cut through the levels of complexity and zero in on the crux of the problem and put in place basic security controls that are effective and efficient, it will lay the groundwork for success.
Borrowing the analogy of racing, would you be driving a race car that has a manual gearbox for full control and is tuned for the race track, or would you just take any car straight from the garage untuned for the conditions of the race track and relying on the car’s automatic gearbox to take care of the driving? Thus, it is clear that returning to basics and tuning your security measures for accuracy and precision is a much better bet than pouring huge investments into advanced systems and mechanics, building layers and layers of security indiscriminately.
Being accurate and precise will enable us to build quantifiability into our cybersecurity program. Accuracy and precision are both ways to measure results. Accuracy measures how close results are to the true or known value, while precision, on the other hand, measures how close results are to one another or, in other words, how well our defenses are designed and executed. This is our motivation behind the development of the RACE model. The subsequent paragraph will describe each key component of the model in greater detail.

Figure 1: The RACE model, a simple 4-part plan for building cyber resilience
Firstly, resiliency in modern cybersecurity speaks to the capability to provide value for the customer. In simplistic terms, it is to provide robustness and survivability of the organization’s cyber footprint in the face of adversaries and threats, meet compliance needs for business governance while excelling and providing a competitive advantage, using whatever security capabilities are based on established best practices, processes, and frameworks that achieve repeatable results. Figure 2 below summarizes what it takes to build cyber resilience and the value it brings to the table, taking into consideration the interplay between being compliance and building capabilities to support the resiliency of the entire information infrastructure that supports the business of an organization.

Figure 2: Building trust, enhancing cyber resilience, and mitigating risks in action
Next, awareness refers not only to imbuing a culture of cybersecurity among all the staff in an organization to the extent that basic cyber hygiene can be practiced but also to targeting the team focusing on delivery and maintaining ICT and security services within the organization so that they pay attention to cementing their core competencies and fundamentals. Hereby, it is recommended that harnessing risks and hedging your bet against the barrage of threats based on a risk-based approach is the best way, given that resources on hand are always scarce, limited, and, to some extent, expensive. Given that is the case, we have identified five basic core fundamentals that every cybersecurity team in any organization needs to build up on their basics (and manage them well) based on common cybersecurity issues faced, as depicted in Figure 3. While it may seem simple, the devil is always in the details to ensure a job is done well.

Figure 3: Managing five common risks (end-to-end) comprehensively as a basis for building cyber resilience
One man, organization, or country cannot resolve cybersecurity issues alone. It takes an entire village to address cybersecurity issues as they affect everyone if anything goes awry. Cybersecurity is a team sport, and all the stakeholders within the ecosystem must contribute towards addressing the elephant in the room, as shown in Figure 4. We always find strength in numbers because “united we stand, divided we fall.” We see the Blackhat community is doing that exactly, and that is why they are always a step ahead of the good guys every time, thereby summarizing the urgency to Collaborate as a key differentiating measure.

Figure 4: Cybersecurity is a team sport. So, who is on the team?
Last but not least, we need to bring everything together to build or Engineer the process, putting the cogwheels into their rightful places to drive the engine forward. We have identified five key fundamental security measures that, if done diligently, will be key to building an end-to-end resilient system and reducing network risks.
As shown in Figure 3, the five key fundamental security measures are 1) software integrity protection, 2) security configuration, 3) digital certification management, 4) vulnerability remediation, and 5) product lifecycle management. Take “Security configuration” as an example. To engineer and address the risk brought about by system misconfiguration, we need to break it down into its elements or identify its Work Breakdown Structure or WBS, which is a key step for planning project tasks and allocating resources.

Figure 5: Security Configuration Example: Optimize the Security Configuration Baseline based on Service Scenarios
Figure 5 summarizes typical work done to break down “security configuration” into its WBS. While this figure does not depict the complete picture, it does show a deep dive into each piece of work. One should keep working on breaking it down until the project scope and all the tasks required to complete the project can be visualized in one snapshot.
In conclusion, we have distilled the entire RACE model in detail in this paper. Achieving RACE is key to building resiliency for any organization. The important thing to note is to keep it simple and go back to basics. Build an auto-evolving, adaptable security framework based on the strategy that is designed to shape-shift alongside emerging blended, hybrid threats by leveraging on actionable intelligence, building resilience, and fostering collaboration so that individuals, organizations, and nations. Establishing public-private partnerships (PPP) with governmental entities and authorities enables public sector players, such as the UAE Cyber Security Council, to act as the fulcrum for coordinating and pooling resources and intelligence. This will enable our modern society to defend against today’s threat and safeguard one’s digital journey by addressing the challenges of tomorrow’s Age of Intelligence.
Tech News
THE 2026 REVOLUTION: WOMEN LEADING IN TECH, AI, AND DATA PROTECTION
Technology is one of those fields that keeps getting more competitive every year, requiring upskilling and talent. Building a company in this environment requires clear focus and the ability to pilot high-stakes rooms where scrutiny often exceeds performance metrics. For some founders, that means bringing perspectives that aren’t always part of the standard playbook. Women leading in tech often navigate these spaces while balancing awareness of how decisions are perceived, not what they achieve. That perspective can shape product design and team culture in ways that sharpen execution and drive innovation.
The World Economic Forum’s Global Gender Gap Report 2024, released last year, showed that women now hold 30% of technology roles in the UAE, above the global average of 25%. This number is only increasing as women take on headstrong roles in tech. According to reports, the software and app development segment sees a slightly lower share of women globally, around 22%, highlighting deeper gender gaps in coding‑intensive domains; however, that barrier is being broken down.
Christiana Maxion, the founder and CEO of MAXION, an app empowering social connections in the UAE that operates as a hybrid SaaS platform, has been driving positive change in the social connections landscape through its AI-powered systems.
When asked about how she was able to build the business in a challenging app development market, particularly in a sector where women remain significantly underrepresented, as reflected in the figures stated above,
She shared, “I think the framing of the question in today’s society is part of the problem and needs to change. Asking women how they ‘managed’ to do it simply implies by default the expectation that we would not have been able to. I built MAXION the same way any serious founder would: by identifying a real problem, validating a model that worked, and scaling it through technology.” However, she adds that while the approach was no different from that of any business leader, the environment she navigated added unique challenges.
“The difference is that I also had to navigate rooms where I was often the only woman, while being judged on optics before outcomes. That requires an additional layer of awareness that is not always required of others in the room. But it also sharpens you in ways nothing else can,” she added.
She further explains that the awareness and perspective gained from navigating high-stakes environments also directly informs how the platform is built.
MAXION is a hybrid SaaS platform designed to transform social connections in the UAE, prioritising real-world interaction over endless swiping. Since its launch, it has facilitated thousands of curated, in-person meetings and built a community of over 7,000 members, carefully selected to ensure confirmed positive outcomes. The platform leverages AI to streamline logistics, optimise scheduling, and enhance user experience, while its growth strategy targets high-density expat hubs with similar social dynamics.
With such a platform, privacy-first design and the protection of sensitive emotional and behavioural data are extremely important, as it deals directly with people and their emotions. Safety issues, such as fear of scams or fake profiles or of being catfished on traditional platforms, often underscore the need for stronger protections and trust‑based design.
MAXION is leading the way through Christiana’s vision and guidance. As a leader, she brings her business and tech expertise along with her empathic values in building a privacy‑first product.
The app uses advanced protection layers. Commenting on the importance, Christiana shares, “Social connection building platforms handle some of the most intimate data a person can share, including emotional patterns, desires, vulnerability. Most of the industry treats that as fuel for engagement. We treat it as something to protect. MAXION was designed with privacy in mind from day one. We minimise retention, reject invasive profiling, and personalise only what members have explicitly consented to. Our systems are built to suppress harassment, and discretion is non-negotiable.” She adds that female leadership shaped that standard, not as a policy layer, but as the foundation on which the entire product sits.
Today’s conversations about women leaders should be more than just what they have accomplished; they should also highlight their capabilities and drive, as well as their eagerness to develop new skills. Looking ahead, Christiana’s focus is on expanding her own skill set while scaling the business.
“Personally, I am focused on becoming a stronger capital allocator. Building a product is one skill set, but scaling a company sustainably across markets is another entirely. That is the growth edge I am leaning into right now, financial discipline, governance, and the leadership required to take MAXION from a regional platform to a global one.”
In terms of the business, Christiana’s focus is execution. “We have the thesis. We have the traction. Now it is about operational precision, making every release, every hire, and every partnership move us closer to the outcome we are building toward. The vision is clear. The work is in the detail.”
As AI and digital platforms handle increasingly sensitive personal data, privacy-first design, ethical product decisions, and operational rigour are becoming essential benchmarks. Women in leadership roles are influencing this evolution, bringing perspectives that prioritise safety, transparency, and intentionality in user experience. Across the sector, these values are shaping how technology is built, scaled, and trusted by users globally.
Tech News
WOMEN IN AV & TECH STARTUP COMPETITION CALLS FOR SUBMISSIONS

Give to Gain in action: $15,000 in funding to back women-led AV startups.
Alex Kemanes and Dino Drimakis, long-standing leaders in the global AV and technology ecosystem, have announced the launch of the Women in AV & Tech Startup Prize, a global call designed to identify and back early-stage founders building practical, execution-ready solutions for the AV ecosystem and closely related fields. The competition is built as a long-term platform open to early-stage women founders. Announced during the International Women’s month and supported by, The Audiovisual and Integrated Experience Association (AVIXA) Women’s Council, a global community committed to supporting and empowering women in the technology and AV industry.
In 2024, female-only founding teams received 2.3% of the $289 billion invested globally in venture capital around $6.7 billion underscoring the scale of the funding gap this initiative aims to address
“This is about taking action, not just having conversations,” said Alex Kemanes, Partner at Midwich Ignite and Regional Managing Director, MESEA at Midwich Group, who is personally supporting and funding the initiative. “If we want to see more women leading and building in our industry, we have to create practical pathways for them. The Women in AV & Tech Startup Prize is one way we are doing that. At the same time, we are backing founders who can execute, people who understand their market, define real problems, and have a credible path to building sustainable businesses.”
Submissions open 8th of March 2026. Founders can apply from anywhere in the world, whether they’re involved directly with AV innovations or part of the AV ecosystem. The criteria to be selected is not based on revenue from the business, or a finished product; it’s rather solving a problem, market viability, and intent to build a lasting solution.
To enter, applicants submit a pitch deck (maximum 20 slides) and a short founder video. What matters is not designing polish, but thinking: the problem and who it affects, what’s being built and why it’s better, who the customer is, how the business makes money, and what stage it’s currently at, idea, prototype, pilots, users, revenue.
“This isn’t a pitch-polish contest,” said Dino Drimakis, Director, Strategic Development, MESEA, Midwich Group who is also personally backing the initiative. “We’re looking for clear thinking, real-world problem selection, and credible pathways to market. Fundamentals beat hype.”
The winner will receive a $15,000 cash prize, awarded and announced on 22nd of April 2026. Any follow-up engagement is at the discretion of the jury and sponsors.
Submissions will be collected via the official competition platform and undergo an initial eligibility and quality review. Shortlisted applications will then be evaluated by an independent jury panel. Judging will focus on problem relevance, solution credibility, market understanding, founder insight, and execution potential.
To maintain the integrity of the program and its participants, the jury reserves the right to withhold the award if no submission meets the required standard. In such cases, feedback may be provided, or the prize may be carried forward to a future edition.
Key dates
- Call for submissions opens: 8th March 2026
- Submission deadline: 6th April, 2026
- Winner announcement: 22nd April, 2026
- To apply: Women in Tech Startup
Tech News
DELINEA ACQUIRES STRONGDM TO DELIVER REAL‑TIME PRIVILEGED ACCESS FOR AI‑DRIVEN ENVIRONMENTS

Delinea, a pioneering provider of solutions for securing human and machine identities through centralized authorization, has completed its acquisition of StrongDM, the universal access management company purpose-built for modern engineering, DevOps, and AI-driven environments.
As enterprises scale agentic AI and automation, privileged access is increasingly required by non-human identities (NHIs) that operate autonomously across hybrid and cloud-native environments, introducing risks that static, credential-based models were never designed to govern. By combining Delinea’s leadership in enterprise privileged access management (PAM) with StrongDM’s just-in-time (JIT) runtime authorization, organizations can discover every identity, reduce risk where it matters, and enforce least-privilege access at the moment of action, making Zero Standing Privilege (ZSP) achievable in practice.
“Standing and hard-coded privileges remain one of the largest sources of risk in modern, AI-driven environments,” said Art Gilliland, CEO at Delinea. “Security teams have historically had to balance between strong identity governance policies and maintaining developer and operational speed. By bringing StrongDM’s runtime authorization capabilities to the Delinea Platform, we’re empowering rapid and secure AI adoption for our customers.”
The combined Delinea and StrongDM platform brings together leading enterprise PAM and runtime authorization into a unified identity security control plane powered by Delinea Iris AI, enabling real-time policy evaluation and governance of privileged actions taken by both human and non-human identities across modern infrastructure.
Together, Delinea and StrongDM deliver:
- Discovery and governance of privileged access for every human and non-human identity across infrastructure, databases, containers, and CI/CD pipelines
- Reduced exposure to credential theft, phishing, and software supply chain attacks by minimizing persistent credentials
- Real-time governance of privileged actions taken by AI agents and other non-human identities through centralized visibility, auditability, and enforcement
“The rise of agentic AI and non-human identities is accelerating operational workflows to machine speed, exposing the limits of static privilege models,” said Emanuel Figueroa, Senior Research Analyst at IDC. “By incorporating StrongDM’s JIT runtime capabilities into the Delinea Platform, organizations can extend Zero Trust to the precise moment of action and advance toward ZSP across both traditional and cloud-native environments.”
Raghu Valipireddy, SVP and Chief Information Security Officer at Axos Financial, said: “I’m genuinely excited about the possibilities of a unified platform. Delinea has done an excellent job securing privileged access across traditional infrastructure for nearly a decade at Axos, while StrongDM solved just‑in‑time access in innovative ways for modern database and cloud environments. When Delinea articulated a vision to bring these capabilities together, it immediately resonated with how we operate and where we’re headed. The combined platform will significantly strengthen our security posture by enabling continuous discovery, governance, and real‑time enforcement of least‑privilege access across critical systems and data, which supports our AI initiatives and accelerates our move toward ZSP in alignment with business priorities.”
With this acquisition, Delinea establishes identity as the control plane for modern security, helping to ensure every privileged action taken by a human or machine identity is evaluated and authorized in real time, enabling organizations to eliminate standing privilege across AI-driven environments.
-
News10 years ago
SENDQUICK (TALARIAX) INTRODUCES SQOOPE – THE BREAKTHROUGH IN MOBILE MESSAGING
-
Tech News2 years agoDenodo Bolsters Executive Team by Hiring Christophe Culine as its Chief Revenue Officer
-
VAR11 months agoMicrosoft Launches New Surface Copilot+ PCs for Business
-
Tech Interviews2 years agoNavigating the Cybersecurity Landscape in Hybrid Work Environments
-
Tech News8 months agoNothing Launches flagship Nothing Phone (3) and Headphone (1) in theme with the Iconic Museum of the Future in Dubai
-
Automotive1 year agoAGMC Launches the RIDDARA RD6 High Performance Fully Electric 4×4 Pickup
-
VAR2 years agoSamsung Galaxy Z Fold6 vs Google Pixel 9 Pro Fold: Clash Of The Folding Phenoms
-
Tech News2 years agoBrighton College Abu Dhabi and Brighton College Al Ain Donate 954 IT Devices in Support of ‘Donate Your Own Device’ Campaign


