White Hat To Combat Cyber-Attacks

Cyber threats on Israeli companies, organisations, and infrastructure grow daily. The Israeli National Cyber Security Authority has been concentrating its efforts to thwart this threat using sub-contractors, cyber companies that each one deals with the defense of a different critical sector. 

One of these companies is White Hat. The company’s CEO, Sharon Nimirovski, says hackers prefer to attack industrial installations through component suppliers and services providers, e.g. accountants and lawyers. The Tel-Aviv company, founded by an elite intelligence unit, supplies cybersecurity to private organisations and to nation states in the future.

“Our intelligence center monitors all sorts of threats and in all levels. We operate with this regard as a military elite unit for the prevention of cyber-attacks”, said the CEO in an interview to iHLS.

He added that currently, hackers are capable of inflicting damages in property and lives just as armies, using a variety of weapons. 

“Hackers can nowadays cause various faults to chemical industries which store large quantities of dangerous agents, thus causing widespread disasters.”

According to Nimirovski, Israel has been challenged by various threats due to the situation in the region and the conflicting forces. He said that threats have been growing from week to week, and each time the company’s experts meet new kinds of threats. “This invisible enemy is sophisticated and uses a wide variety of ways for causing damage.” He added that currently, private companies help the National Cyber Security Authority established by the Israeli government in the detection and prevention of evolving threats. 

“We were assigned to deal with a certain sector. Of course, I cannot reveal which one, however, this sector has a great potential for damages.”

The company CEO said that sometimes an evolving threat is detected but the problem is that it is not clear when and where it will be executed. 

“We are dealing with a realm where many things are not immediately clear, so an intelligence array has to be established in order to decrease uncertainty, which might be critical in this case.”He added that his team detects threats that are already in the “backyard” of the threatened customer. “Through the intelligence operations room, we are capable of alerting the customer that someone is about to attack him through a certain vulnerability.”

All this is executed, according to Nimirovski, by a complete system of attack simulations that expose the customer’s vulnerabilities in each of his online systems. 

“We do not sit and wait that something happens in order to learn lessons. Rather, we try to take preventive steps, as attacks in this field might be very painful and cause tremendous damage.”

Currently, White Hat operates a threat detection array called White Knight. This system is active in the social media, detecting threats even at the stage of planning. “The problem is the huge amounts of information. This is why our system is an advanced big data system that knows how to expose the relevant information.” For the purpose of social media activity, the company operates human intelligence, which is, in fact, technological means that pretend to be human-based intelligence.

“Each of our employees operates such kind-of-human agents that roam around the net trying to detect preliminary signs to a hostile cyber activity.” 

He explained that one of the methods frequently employed by hackers is an attack through companies’ sub-suppliers. “The suppliers have got the most sensitive information and it is through them that assailants can get to the critical crossroads.”

The company CEO added that “in case of a state-sponsored attack, in most cases, it will be impossible to identify it. The amount of resources invested in it is so great that many resources will be required for hiding it.”

I-HLS:

You Might Also Read:

Israeli Cybersecurity Company Beats All Hackers:

Israeli Business Expands Its Cyber Footprint:

 

« Blockchain v World Cup – It Could Go To Penalties…
BMW Cars Can He Hacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Karamba Security

Karamba Security

Karamba provide an IoT Security solution for ECUs in automobiles which ensures that all cars are protected (not just autonomous cars).

Insta Group

Insta Group

Insta are a trusted cyber security partner for security-critical companies and organizations.

Verint Systems

Verint Systems

Verint is a leader in Actionable Intelligence with a focus on customer engagement optimisation, security intelligence, fraud, risk and compliance.

CSL Group

CSL Group

CSL solutions provide complete end-to-end connectivity services for Security, Fire, Telecare and other mission critical M2M/IoT applications.

ThreatAdvice

ThreatAdvice

ThreatAdvice is a provider of cybersecurity education, awareness and threat intelligence.

Aujas Cybersecurity

Aujas Cybersecurity

Aujas has deep expertise and capabilities in Identity and Access Management, Risk Advisory, Security Verification, Security Engineering, & Managed Detection and Response services.

Nova Leah

Nova Leah

Nova Leah helps connected medical device manufacturers meet cybersecurity compliance requirements throughout the entire product lifecycle.

Redwall Technologies

Redwall Technologies

Redwall provides cybersecurity expertise and technology to prevent and respond to emerging threats against mobile applications and connected infrastructures.

SHIELD

SHIELD

SHIELD are the world’s leading cybersecurity company specializing in cyber fraud and identity solutions.

Gridware

Gridware

Gridware is a specialised cybersecurity consultancy firm and an emerging global player in the cybersecurity intelligence and advisory field.

Fullstack Academy

Fullstack Academy

A trailblazer in bootcamp education, Fullstack Academy prepares students for fulfilling careers in tech through our NYC campus, online learning, and university partnerships.

CyberCure

CyberCure

CyberCure provide specialised roles and services to manage your organisations cybersecurity requirements and professional advisory services in governance, risk and compliance.

Grypho5

Grypho5

Grypho5 offers managed packages to protect where threat actors strike most. We defend your infrastructure dynamically, leaving you to focus on other priorities.

Sacumen

Sacumen

Sacumen is a niche player in the cybersecurity market, solving critical problems for security product companies.

Cyber Advisors

Cyber Advisors

Cyber Advisors offers customizable cyber security solutions and IT services for businesses of all sizes across the nation from experts you can trust.

Operational Systems (OpSys)

Operational Systems (OpSys)

OpSys is a leading Managed IT and Cyber Security provider protecting the critical elements of businesses across the globe.