White Hat To Combat Cyber-Attacks

Cyber threats on Israeli companies, organisations, and infrastructure grow daily. The Israeli National Cyber Security Authority has been concentrating its efforts to thwart this threat using sub-contractors, cyber companies that each one deals with the defense of a different critical sector. 

One of these companies is White Hat. The company’s CEO, Sharon Nimirovski, says hackers prefer to attack industrial installations through component suppliers and services providers, e.g. accountants and lawyers. The Tel-Aviv company, founded by an elite intelligence unit, supplies cybersecurity to private organisations and to nation states in the future.

“Our intelligence center monitors all sorts of threats and in all levels. We operate with this regard as a military elite unit for the prevention of cyber-attacks”, said the CEO in an interview to iHLS.

He added that currently, hackers are capable of inflicting damages in property and lives just as armies, using a variety of weapons. 

“Hackers can nowadays cause various faults to chemical industries which store large quantities of dangerous agents, thus causing widespread disasters.”

According to Nimirovski, Israel has been challenged by various threats due to the situation in the region and the conflicting forces. He said that threats have been growing from week to week, and each time the company’s experts meet new kinds of threats. “This invisible enemy is sophisticated and uses a wide variety of ways for causing damage.” He added that currently, private companies help the National Cyber Security Authority established by the Israeli government in the detection and prevention of evolving threats. 

“We were assigned to deal with a certain sector. Of course, I cannot reveal which one, however, this sector has a great potential for damages.”

The company CEO said that sometimes an evolving threat is detected but the problem is that it is not clear when and where it will be executed. 

“We are dealing with a realm where many things are not immediately clear, so an intelligence array has to be established in order to decrease uncertainty, which might be critical in this case.”He added that his team detects threats that are already in the “backyard” of the threatened customer. “Through the intelligence operations room, we are capable of alerting the customer that someone is about to attack him through a certain vulnerability.”

All this is executed, according to Nimirovski, by a complete system of attack simulations that expose the customer’s vulnerabilities in each of his online systems. 

“We do not sit and wait that something happens in order to learn lessons. Rather, we try to take preventive steps, as attacks in this field might be very painful and cause tremendous damage.”

Currently, White Hat operates a threat detection array called White Knight. This system is active in the social media, detecting threats even at the stage of planning. “The problem is the huge amounts of information. This is why our system is an advanced big data system that knows how to expose the relevant information.” For the purpose of social media activity, the company operates human intelligence, which is, in fact, technological means that pretend to be human-based intelligence.

“Each of our employees operates such kind-of-human agents that roam around the net trying to detect preliminary signs to a hostile cyber activity.” 

He explained that one of the methods frequently employed by hackers is an attack through companies’ sub-suppliers. “The suppliers have got the most sensitive information and it is through them that assailants can get to the critical crossroads.”

The company CEO added that “in case of a state-sponsored attack, in most cases, it will be impossible to identify it. The amount of resources invested in it is so great that many resources will be required for hiding it.”

I-HLS:

You Might Also Read:

Israeli Cybersecurity Company Beats All Hackers:

Israeli Business Expands Its Cyber Footprint:

 

« Blockchain v World Cup – It Could Go To Penalties…
BMW Cars Can He Hacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Paraben

Paraben

Paraben provides digital forensics solutions for mobile devices, smartphones, email, hard drives, and gaming system.

GSMA - IoT Security Guidelines

GSMA - IoT Security Guidelines

GSMA has created a set of security guidelines for the benefit of service providers who are looking to develop new IoT products and services.

LEXFO

LEXFO

LEXFO specializes in the security of information systems, assisting clients in protecting information assets using an offensive and innovative approach.

idappcom

idappcom

idappcom provides unique industry approved software solutions for auditing and enhancing the threat recognition and response capabilities of your corporate security defences.

Computer Forensic Services

Computer Forensic Services

Computer Forensic Services are digital evidence specialists. Practice areas include Information Security, e-Discovery, Law Enforcement Support and Litigation.

HYPR

HYPR

HYPR Decentralized Authentication minimizes the risk of enterprise data breaches while providing an enhanced user experience for your customers and employees.

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp is the world’s largest network of multi-corporate backed accelerators helping startups scale internationally.

IronClad Encryption (ICE)

IronClad Encryption (ICE)

Ironclad Encryption is Dynamic Encryption. The encryption sequence changes continuously so there is never a correlation between data sent and data received.

Mage Data

Mage Data

Mage (formerly Mentis Software) is a leading solutions provider for data security and data privacy software for global enterprises.

Computacenter

Computacenter

Computacenter is a leading independent technology partner, trusted by large corporate and public sector organisations. We help our customers to source, transform and manage their IT infrastructure.

Coffee Cup Solutions

Coffee Cup Solutions

We offer a full spectrum of IT Services, from our UK based Helpdesk to IT Consultancy and Cyber Security. Our team has the skills and experience to develop, deliver and manage IT for your business.

Cynical Technology

Cynical Technology

Cynical Technology is a Nepalese cybersecurity company with expertise in security consulting, auditing, testing and compliance.

Var Group

Var Group

Var Group is one of the main partners for innovation in the ICT sector in Italy.

Arsen Cybersecurity

Arsen Cybersecurity

Arsen is a French cybersecurity startup, dedicated to enhancing human behaviors in cybersecurity.

Star Lab

Star Lab

Star Lab specializes in the development and productization of embedded security technologies.

Silicon Valley Cybersecurity Institute (SVCSI)

Silicon Valley Cybersecurity Institute (SVCSI)

SVCSI aims to investigate, develop, and promote technical excellence and the best security practices for dependable and secure systems and applications.