From access to impact: why 2025 was the year OT threats grew teeth
OT cybersecurity took a hit in 2025 as threat groups mapped control loops and targeted distributed energy – shrinking the gap between access and physical impact.
Read More
What is the hot topic of the year in the current cyber landscape?
Increased Cyber threats due to geopolitical situations.
How do you react to constantly changing threats in the market?
Being Vigilant, proactive measure to detect and quick response to mitigate.
What are some of your favorite "new" technologies or tools?
AI driven solutions to help solve legacy and emerging security problems for developers.
What are some of the key components to succeeding as a CISO in today’s business environment?
Understanding business needs enabling business to grow while offering needed security measures. Balancing regulatory and security activities.
What are the three things that you as CISO look at first to assess an organization’s cybersecurity readiness?
Cyber security detection and protection mechanisms, governance and subject matter experts in various areas of security domain.
You are set to the stage at Black Hat MEA this November, what can our audience expect from your session, and what are you most excited about?
Simple or complex, automated or human centric efforts for delivering secure applications. Excited to interact and learn from other speakers on their security tools and practices.
Join the newsletter to receive the latest updates in your inbox.
OT cybersecurity took a hit in 2025 as threat groups mapped control loops and targeted distributed energy – shrinking the gap between access and physical impact.
Read More
Ransomware now reaches full encryption in just three hours. Analysis of Barracuda and Securin data reveals how Akira and others are accelerating attacks.
Read More
The average time to exploit has fallen from 745 days in 2020 to just 44 days in 2025, according to Flashpoint. Here’s why N-day vulnerabilities are driving faster attacks.
Read More