Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Israel’s cyber sector weathers the war
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Israel’s cyber sector weathers the war
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Cybersecurity ExecutivesExpert OpinionsIsrael Conflict

Israel’s cyber sector weathers the war

Editorial Team
September 19, 2024 at 10:59 AM
By Editorial Team Editorial Team
Share
Irina Tsukerman, US National Security Lawyer, ABAS Member, and Geopolitical Analyst & President for Scarab Rising, Inc.
Irina Tsukerman, US National Security Lawyer, ABAS Member, and Geopolitical Analyst & President for Scarab Rising, Inc.
SHARE
Irina Tsukerman, US National Security Lawyer, ABAS Member, and Geopolitical Analyst & President for Scarab Rising, Inc.

In an exclusive interview with Cyber Intelligence, Irina Tsukerman outlines the ongoing impact that the ongoing Israel/Hamas conflict is having not only on cybersecurity in the region, but on the global sector as a whole.

Irina Tsukerman is a US national security lawyer with a background in cybersecurity policy, a member of the American Bar Association’s Science and Technology Section, a geopolitical analyst, and President of Scarab Rising, Inc., and a security and geopolitical risk strategic advisor.

Cyber Intelligence: What has been the impact of the current Israel/Hamas conflict on Tel Aviv’s cybersecurity sector, which is said to attract over half the entire world’s cybersecurity spend?

Irina Tsukerman: Israel’s cyber start-ups have actually attracted a great deal of interest since the start of the war. Although major companies are moving their headquarters to locations unaffected by the conflict, investment in Israel’s own cybersecurity sector is increasing.

Cyber Intelligence: Has this been the case since the beginning of the conflict, and what kind of problem has the sector been facing?

Irina Tsukerman: In the early stages of the war, some companies canceled their funding announcements due to the impact of reserve duty and external pressures.

Cyber Intelligence: Are any of these difficulties still ongoing?

Irina Tsukerman: Although the funding has stabilized and the industry internal to Israel is resilient, local companies are facing challenges, including reserve duty for many of the members, high travel costs, which make it difficult for meetings to take place, and the issues of forced relocation which is particularly difficult for smaller companies. Macroeconomic conditions and political strife had prompted drop-offs in venture capital funding to Israeli companies and led roughly 70% of Israeli startups to relocate parts of their businesses.

Cyber Intelligence: How has the conflict affected the Middle East cybersecurity sector in general?

Irina Tsukerman: China’s role in the region as a cybersecurity rival to Israel is rising and benefiting from the exit of the international cybersecurity headquarters from the country as well as from the challenges to the Israeli cyber sector. China is a growing purveyor of cyber-surveillance software to other Middle Eastern states, including both Iran and Saudi Arabia, and is increasingly cooperating with countries like the UAE, which is currently sounding alarm bells in the US.

Cyber Intelligence: Why is that?

Irina Tsukerman: Where the US has offset some of this competition through major investments into the artificial intelligence (AI) sector, more direct cybersecurity issues in the region continue to benefit from China’s role.  However, Israel is still managing to maintain strong cybersecurity ties with European states and European companies. However, it is facing stiff competition from the US, together with reputational damage resulting from the scandalous campaigns against Israel’s cybersecurity sector even before the war. The additional reputational risk related to the ongoing war in Gaza is compounding this negative impact.

Cyber Intelligence: So is it going to be a battle for the lion’s share of the Middle East cyber market between Israel, China and the US?

Irina Tsukerman: Emerging actors in the region, such as Saudi Arabia are also looking to develop their own independent cybersecurity sector. And countries like India, which maintains strong cooperation with Israel in that regard, are also keen to challenge China’s dominance in that area.

Cyber Intelligence: Is this an indication that the cybersecurity sector is becoming increasingly global in nature?

Irina Tsukerman: Israeli companies have likewise partially followed the trend of relocating to outside Israel; In many cases, cybersecurity companies in Israel maintain their marketing teams outside Israel in general, so their activity has remained unaffected.

Cyber Intelligence: How is Israel’s cybersecurity sector coping in general now that we are almost a year into the conflict?

Irina Tsukerman: Despite these conditions, Israel’s cybersecurity industry remains vibrant. It is facing additional challenges from the role in helping identify the location of the hostages and other forms of war-related cooperation with the government and also from the rising number of cyber-attacks by Iran and its proxies. On the other hand, Israel is also finding opportunity in the new challenges presented by the regional cyber-war escalation, leaving it in pole position to provide unique expertise to the US, which is seeing a rising number of election interference incidents by Iranian hackers.

Cyber Intelligence: Thank you.

Editorial Team September 25, 2024 September 19, 2024
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article Beirut, Lebanon hit by explosive pager attacks Lebanon pager attack signals new era in cyber warfare
Next Article chinese phishing attack on the US military Chinese phisher steals top US military secrets
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

Tim Grieveson, CSO of ThingsRecon
Cybersecurity ExecutivesExpert Opinions

Safeguarding the entire attack surface

In an exclusive interview with Cyber Intelligence, Tim Grieveson, Chief Security Officer for attack surface discovery platform, ThingsRecon, explains how companies can protect their constantly expanding attack surfaces while using AI tools to monitor potential vulnerabilities in real time.

May 16, 2025
NIKESH ARORA, CEO OF PALO ALTO NETWORKS
Cybersecurity ExecutivesExpert OpinionsThreat Intelligence

Cybersecurity has become an ongoing war

In our business, assessing risk is crucial. There is a constantly evolving threat landscape, and cybercriminals are constantly introducing new techniques and developing existing ones. And as online connectivity grows, so does every organization's overall attack surface. Unit 42 are constantly conducting research examining the full scope of the ever expanding attack surface and constantly testing existing defenses. They play the role of cybercriminals, acting as white-hat hackers, if you like, in order to detect potential weaknesses. This research is conducted across the board and also directed at each client specific attacks surface. And when there is a breach, Unit 42 is there to detect and control it. They effectively act as wartime consiglieres – remember that the ongoing Russia/Ukraine conflict started in cyberspace. They must also act immediately to mitigate any breach that does occur. Constant research and testing of defenses are vital. We have to be right every time, but the cybercriminal gangs only have to be right once to effect a breach and perform a successful attack.

April 15, 2025
Cyber EspionageCybersecurity ExecutivesExpert Opinions

Only a Global Force Can Combat Cybercrime

George Patsis is the founder and CEO of Obrela and has a proven track record in developing large-scale innovative security programs for major Global 500 companies. In an exclusive interview with Cyber Intelligence, he explains why a global approach is needed to fight cybercrime. This is a philosophical discussion shaped by the evolving changes in the human and society conditions. Ten years ago, digital communications and laptops were supplementary tools in people’s lives and perceived as an extension of our natural world. Today, we are witnessing the evolution of a full-scale digital transformation leading to an entirely new domain: cyberspace. Much like the air travel leading to partitioning of the skies, or the British Empire’s domination of the seas or the space quest. Whenever humankind discovers new domains and frontiers, the absence of clear leadership and authority often leads to conflict and crime. In the American Old West, every town had its own safe, and criminals tried to rob it. In the same way, the new digital frontier of cyberspace is driving demand for companies like OBRELA to protect their digital assets. But we need more than just individual Cybersecurity companies to protect us across the new threats in cyberspace. In the absence of a central cybersecurity authority, cybercriminals operate with near impunity—facing little resistance, no clear attribution, and a remarkably low risk of consequences.

April 10, 2025
Sean Murphy, CISO at BECU
AerospaceCybersecurity ExecutivesExpert Opinions

From deepfakes to in-person fraudsters

Boeing Employees' Credit Union (BECU) is a not-for-profit credit union based in Washington, dedicated to improving the financial well-being of its members and communities. It has grown beyond serving Boeing’s employees to more than 1.5 million members and $29 billion in assets. In an exclusive interview, Sean Murphy, Chief Information Security Officer (CISO) at BECU, explains the changing cyber-threats now facing consumers. The cybersecurity challenges faced by all consumers have escalated with the growth of artificial intelligence (AI). We have witnessed the growing use of botnets, and AI is at such a stage that it can be used to attempt to gain access to accounts on an individual level. The use of virtual private networks (VPNs) simplifies this process and makes it difficult to track. Remember – while organizations are constantly monitoring for threats and attacks, the cybercriminals only have to get it right one time to cause a highly damaging breach. Advanced persistent threats (APTs) have now become a major ongoing threat. Financial institution employees are the first line of defense against cyber attackers and play a key role in protecting consumers. As such, a robust cybersecurity team and the regular training of employees is crucial.

March 17, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?