White Hat To Combat Cyber-Attacks

Cyber threats on Israeli companies, organisations, and infrastructure grow daily. The Israeli National Cyber Security Authority has been concentrating its efforts to thwart this threat using sub-contractors, cyber companies that each one deals with the defense of a different critical sector. 

One of these companies is White Hat. The company’s CEO, Sharon Nimirovski, says hackers prefer to attack industrial installations through component suppliers and services providers, e.g. accountants and lawyers. The Tel-Aviv company, founded by an elite intelligence unit, supplies cybersecurity to private organisations and to nation states in the future.

“Our intelligence center monitors all sorts of threats and in all levels. We operate with this regard as a military elite unit for the prevention of cyber-attacks”, said the CEO in an interview to iHLS.

He added that currently, hackers are capable of inflicting damages in property and lives just as armies, using a variety of weapons. 

“Hackers can nowadays cause various faults to chemical industries which store large quantities of dangerous agents, thus causing widespread disasters.”

According to Nimirovski, Israel has been challenged by various threats due to the situation in the region and the conflicting forces. He said that threats have been growing from week to week, and each time the company’s experts meet new kinds of threats. “This invisible enemy is sophisticated and uses a wide variety of ways for causing damage.” He added that currently, private companies help the National Cyber Security Authority established by the Israeli government in the detection and prevention of evolving threats. 

“We were assigned to deal with a certain sector. Of course, I cannot reveal which one, however, this sector has a great potential for damages.”

The company CEO said that sometimes an evolving threat is detected but the problem is that it is not clear when and where it will be executed. 

“We are dealing with a realm where many things are not immediately clear, so an intelligence array has to be established in order to decrease uncertainty, which might be critical in this case.”He added that his team detects threats that are already in the “backyard” of the threatened customer. “Through the intelligence operations room, we are capable of alerting the customer that someone is about to attack him through a certain vulnerability.”

All this is executed, according to Nimirovski, by a complete system of attack simulations that expose the customer’s vulnerabilities in each of his online systems. 

“We do not sit and wait that something happens in order to learn lessons. Rather, we try to take preventive steps, as attacks in this field might be very painful and cause tremendous damage.”

Currently, White Hat operates a threat detection array called White Knight. This system is active in the social media, detecting threats even at the stage of planning. “The problem is the huge amounts of information. This is why our system is an advanced big data system that knows how to expose the relevant information.” For the purpose of social media activity, the company operates human intelligence, which is, in fact, technological means that pretend to be human-based intelligence.

“Each of our employees operates such kind-of-human agents that roam around the net trying to detect preliminary signs to a hostile cyber activity.” 

He explained that one of the methods frequently employed by hackers is an attack through companies’ sub-suppliers. “The suppliers have got the most sensitive information and it is through them that assailants can get to the critical crossroads.”

The company CEO added that “in case of a state-sponsored attack, in most cases, it will be impossible to identify it. The amount of resources invested in it is so great that many resources will be required for hiding it.”

I-HLS:

You Might Also Read:

Israeli Cybersecurity Company Beats All Hackers:

Israeli Business Expands Its Cyber Footprint:

 

« Blockchain v World Cup – It Could Go To Penalties…
BMW Cars Can He Hacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IASME Consortium

IASME Consortium

IASME is one of five companies appointed as Accreditation Bodies for assessing and certifying against the UK Government's Cyber Essentials Scheme.

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

Acuity Risk Management

Acuity Risk Management

Acuity Risk Management helps businesses worldwide effectively manage, prioritize and report on their risks to inform strategic and tactical decision-making and build long-term resilience.

CERT-In

CERT-In

CERT-In is a functional organisation of the Ministry of Information & Electronics Technology, Government of India, with the objective of securing Indian cyber space.

Cyber Security Specialists

Cyber Security Specialists

Cyber Security Specialists Limited provide Security services across a wide range of markets, from multi-national Corporate Organisations and Government Agencies, through to smaller Businesses.

Data443 Risk Mitigation

Data443 Risk Mitigation

Data443 Risk Mitigation provides next-generation cybersecurity products and services in the area of data security and compliance.

CyberStream

CyberStream

CyberStream, a division of the TechStream Group, is an information & cybersecurity talent acquisition solution provider.

Salviol Global Analytics

Salviol Global Analytics

Salviol Global Analytics is a leading provider of Fraud, Risk and Operational Performance Solutions to a number of vertical markets including Insurance, Banking, Utilities, Telco’s and Government.

TeskaLabs

TeskaLabs

TeskaLabs is a software vendor of cybersecurity and data privacy products.

Stealth Software Technologies

Stealth Software Technologies

Stealth Software Technologies is focused on the generation of research and software products focused on applied cryptography and cybersecurity.

Netpoleon Group

Netpoleon Group

Netpoleon is a leading provider of integrated security, networking solutions and value added services.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

Safe Systems

Safe Systems

Safe Systems provide compliance centric IT services for community banks and credit unions, ensuring that they are kept up to date on current technologies, security risks, and regulatory changes.

DartPoints

DartPoints

DartPoints helps bridge the digital divide by delivering cloud, colocation, managed services + edge infrastructure.

Check Point Software Technologies

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and corporate enterprises globally.

Oduma Solutions

Oduma Solutions

Oduma Solutions is a wholly owned Ghanaian Cybersecurity company that offers information security services to organisations seeking to improve their security posture.