Tuesday, 16 April, 2024, 1:43 PM
Advance Search

Walton's CISO lauds use of AI to prevent cyber break in

Published : Tuesday, 20 February, 2024 at 12:00 AM  Count : 531

Walton's CISO lauds use of AI to prevent cyber break in

Walton's CISO lauds use of AI to prevent cyber break in

Chief information security officer (CISO) at Walton Hi-Tech Industries PLC Md Jahangir Hossain, lauded the use of artificial intelligence in high tech products and its security while talking with the Daily Observer.

About various initiatives Bangladesh has taken to enhance cybersecurity at industries and organization level, Jahangir said the county has implemented policies, regulations, and initiatives such as BGD e-GOV CIRT, Cyber Security Act 2023, and identifying 29 Critical Information Infrastructures Organizations (CIIOs) to strengthen country cybersecurity framework.

Talking about fast evolving cyber-attacks in response to changes in technology and security measures, he said cyber-attacks are increasing with increased sophistication of the mechanism, including tactics like ransomware proliferation, supply chain attacks, fileless malware, cloud security challenges, IoT exploitation, AI integration, and hybrid/multi-vector attacks.

Remedial measures are also quickly developing to address the gap.  

He said at Walton ManageEngine contributed to seal any attack by upgrading  cybersecurity management and was able in the process to achieve ISO 27001 certification.

ManageEngines SIEM system, Log360, helped Walton Group to detect cyber attack by developing proactive measures, compliance, security incident audits eventually progressing towards ISO 27001certification.

Talking about how is AI being utilized by both attackers and defenders in the realm of cybersecurity, Jahangir said AI is used by attackers for automated attacks, phishing, adaptive malware, credential stuffing, zero-day exploitation, while defenders employ AI for threat detection, anomaly detection.

AI is also used to detect incident response, predictive analysis, security automation, vulnerability management, and  user authentication to keep safe.

About the most prevalent types of cyber-attacks faced by organizations, he said they commonly face phishing attacks, ransomware attacks, distributed denial of service (DDoS) attacks, malware infections, and man-in-the-middle (MitM) attacks.

Jahangir said some key considerations for cybersecurity awareness among data handlers require   undergoing regular training on cybersecurity best practices, understand data classification and handling, recognize phishing attempts, practice password security, ensure device security, be trained in incident response.

They must also understand physical security measures, comply with regulations, engage in continuous learning, use role-based access controls, and prioritize secure communication channels, he said.

Latest News
Most Read News
Editor : Iqbal Sobhan Chowdhury
Published by the Editor on behalf of the Observer Ltd. from Globe Printers, 24/A, New Eskaton Road, Ramna, Dhaka.
Editorial, News and Commercial Offices : Aziz Bhaban (2nd floor), 93, Motijheel C/A, Dhaka-1000.
Phone: PABX- 41053001-06; Online: 41053014; Advertisement: 41053012.
E-mail: info©dailyobserverbd.com, news©dailyobserverbd.com, advertisement©dailyobserverbd.com, For Online Edition: mailobserverbd©gmail.com
  [ABOUT US]     [CONTACT US]   [AD RATE]   Developed & Maintenance by i2soft