logo
How AI is reinventing cybersecurity for the Automotive Industry

How AI is reinventing cybersecurity for the Automotive Industry

Tahawul Tech22-04-2025
Alain Penel, VP of Middle East, CIS & Turkey at Fortinet, explores how AI is quietly becoming the invisible co-pilot in every connected vehicle—monitoring, predicting, and preventing cyber threats before they can hit the brakes on progress.
Autonomous and electric vehicle uptake is rising across the Middle East, driven by national agendas and a growing push for sustainable mobility. With this rapid growth however comes an urgent need to address cybersecurity at every stage of the automotive value chain.
Artificial Intelligence (AI) is at the heart of this shift; transforming not only how vehicles operate, but also how cyber threats are identified, mitigated, and prevented. From predictive maintenance to driver behaviour analytics, AI is streamlining processes and unlocking efficiencies. But it is also redefining the security perimeter for automotive organisations.
Forces Influencing AI Adoption in Automotive
As the industry evolves, three forces are shaping the current landscape: stricter regulations, rapid AI integration, and a fundamental change in communication infrastructure. Regulations such as the Cyber Resilience Act and NIS2 for example are introducing more granular compliance mandates, especially for sectors handling critical infrastructure.
Meanwhile, AI is accelerating business and individual learning processes. At the network level, the need for faster communication and bandwidth adaptability is giving rise to next-generation connectivity frameworks that can support AI-native systems.
This evolution in infrastructure and intelligence also promotes a significant shift in cybersecurity from reactive to preventive. AI is increasingly being used to analyse threat landscapes and internal vulnerabilities in real-time. This shift enables organisations to prepare for attacks before they happen, leveraging behavioural analytics and high-speed correlation to stay ahead of potential breaches. Hardware acceleration and software development, guided by AI, are now setting the pace for how cybersecurity evolves across the industry.
The Impact of Cybersecurity
Unsurprisingly, automotive enterprises are becoming high-value targets for cybercriminals. Three core factors contribute to this trend; the financial opportunity of holding connected services hostage, the complexity of digital supply chains, and the vast amount of sensitive data being generated.
With every vehicle connected to cloud-based services, a single breach can have wide-ranging brand, operational, and financial repercussions. Moreover, the ecosystem of third-party vendors involved in producing autonomous and electric vehicles significantly expands the attack surface.
The use of digital twins and advanced manufacturing technologies further intensifies the volume of valuable data. This information ranging from user behaviour patterns to proprietary designs is not only attractive to attackers but also becomes a tool for launching future attacks or selling on the dark web.
AI Transformations in the Automotive Supply Chain
AI is also transforming the automotive supply chain. Predictive maintenance for example – as opposed to scheduled or reactive vehicle maintenance, which until now has been the norm – enables companies to forecast part failures, optimise distribution, and reduce warehousing costs. AI can analyse and synthesise so many data streams that this guessing game becomes much more accurate. Not only does this mean more reliable vehicles for the consumer, but it also means that each element of demand can be optimised.
Driver behaviour analysis and in-cabin monitoring systems powered by AI are also enhancing safety, particularly for long-haul truck drivers exposed to risks such as fatigue and theft. These AI-powered innovations are already helping companies reduce operational costs while improving customer satisfaction.
Strengthening security across the supply chain means embedding real-time monitoring, mapping data flows, and building a fast, coordinated response to incidents. The introduction of cyber resilience principles encouraged by regulatory bodies requires organisations to maintain robust and sustainable response mechanisms. AI can help with this.
AI's Role in Automotive Cybersecurity
The future of AI in automotive cybersecurity lies in its ecosystem-wide integration. Multimodal AI models that can process text, images, and design data are already in use.
But the next phase involves combining internal and external intelligence to strengthen risk postures. Synthetic data created specifically to train internal models without exposing real user data is becoming an important asset in speeding up AI development while preserving privacy.
The impact of AI can be summarised as transformative, dual-edged, and adaptable. It is enhancing cybersecurity readiness, being weaponised by attackers, and empowering businesses to evolve quickly in a changing environment.
As the Middle East embraces connected mobility and smart transportation, the conversation must move beyond adopting AI to implementing it securely and intelligently. The road to the future may be autonomous, but its success will hinge on cybersecurity built for adaptability, speed, and scale.
Image Credit: Fortinet
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Fortinet Introduces Quantum-Safe Security Features In FortiOS
Fortinet Introduces Quantum-Safe Security Features In FortiOS

Channel Post MEA

timea day ago

  • Channel Post MEA

Fortinet Introduces Quantum-Safe Security Features In FortiOS

Fortinet has announced expanded innovations within its unified operating system, FortiOS, that protect against quantum-computing threats to current encryption standards. The latest FortiOS capabilities help organizations with highly sensitive data deploy encryption algorithms and key distribution methods that can withstand quantum-powered attacks, stack algorithms for more robust protection, and easily transition to post-quantum security. 'At Fortinet, we're committed to arming customers with cutting-edge technology to protect against new and emerging threats. As quantum computing advances, organizations can trust Fortinet's technology innovation and leadership to safeguard their critical data and future-proof their infrastructures. Many enterprises are eager to take action to protect their networks from quantum-powered threats. That's why we've made cutting-edge, quantum-safe features available today for FortiGate NGFW and Fortinet Secure SD-WAN customers, so they can confidently transition to post-quantum security,' said Michael Xie, Founder, President, and Chief Technology Officer at Fortinet. Organizations Handling Sensitive Information Need Quantum-Safe Encryption Now Quantum computers can perform complex calculations at unprecedented speeds and can easily break current encryption standards. Cybercriminals are already storing encrypted traffic to decrypt in the future, with a particular focus on industries that handle highly sensitive data that remains relevant over long periods, such as telecommunications, financial services, government, and healthcare. FortiOS: ready for the post-quantum world With FortiOS 7.6, organizations, such as those using FortiGate next-generation firewall (NGFW) and Fortinet Secure SD-WAN, can now leverage built-in quantum-safe features designed to defend against emerging threats, including harvest-now, decrypt-later (HNDL) attacks. These capabilities help secure network traffic, simplify deployment, and support a smooth transition to post-quantum security. Customers have access to the following quantum-safe features at no additional cost: Post-quantum cryptography (PQC) methods, including National Institute of Standards and Technology (NIST)-approved algorithms like ML-KEM and emerging algorithms like BIKE, HQC, and Frodo. Quantum key distribution (QKD), leveraging quantum mechanics to enable the secure exchange of encryption keys, ensures that any eavesdropping attempts are detectable. Fortinet introduced support for QKD integrations starting with FortiOS 7.4, enabling interoperability with leading QKD vendors via standardized interfaces. This capability underscores Fortinet's proactive approach to quantum-resilient network security by integrating quantum-safe key exchange mechanisms into its NGFW architecture. Algorithm stacking, which combines multiple cryptographic algorithms to create a more resilient solution and enhance network infrastructure security. A hybrid mode for gradual transition to post-quantum security that enables seamless integration of traditional public-key cryptography and QKD. An enhanced user interface that simplifies the configuration and management of quantum-safe settings so that network administrators can implement quantum-safe security easily. Proven Innovation You Can Trust Fortinet was founded on the principle of converging networking and security through a single operating system. This unique approach enables Fortinet to deploy cutting-edge updates, such as quantum-safe innovations, across its unified operating system, helping customers future-proof their security postures.

Startups Can't Afford to Ignore Cybersecurity: Interview
Startups Can't Afford to Ignore Cybersecurity: Interview

TECHx

time4 days ago

  • TECHx

Startups Can't Afford to Ignore Cybersecurity: Interview

Home » Startups » Startups Can't Afford to Ignore Cybersecurity: Interview Fresh off an award win at GISEC North Star 2025, TECHx Media spoke with Vivek Chandran, CEO of RISKNOX Private Limited, for an interview featured in the recent June–July 2025 edition of CodeRED. In this conversation, he explains why cybersecurity has become a survival issue for startups. Size and speed no longer guarantee success. As cyberattacks grow more sophisticated, even early-stage startups are in the crosshairs. Once dismissed as too small to target, they now face the same threats as global enterprises. To understand what's at stake and what emerging businesses should do, Vivek brings a grounded, tactical view of the evolving threat landscape and how startup leaders can survive and thrive in 2025 and beyond. What are the top cybersecurity threats that startups should be most concerned about in 2025 and the coming years? The cybersecurity threat landscape isn't what it was even five years ago, it's evolving constantly. That's the first thing startups need to understand: it's not a static problem. The tools and tactics used by cybercriminals change every few months, if not weeks. If I had to pick the top three threats right now, AI-enabled cyberattacks would top the list. We're seeing a rise in sophisticated attacks powered by artificial intelligence, from deepfake phishing to automated vulnerability scanning and exploitation. These are faster, more adaptive, and harder to detect than traditional threats. Second, and this may surprise some, is human negligence. It's not a 'threat' in the classic sense, but it's often the root cause of security breaches. You can spend millions on tech, but one employee clicking the wrong link can still bring the system down. Humans remain the weakest link. And third, phishing is still a huge problem. It's old-school, but highly effective. Startups are particularly vulnerable because they often lack the infrastructure to detect and respond to social engineering attacks quickly. Phishing doesn't need to be advanced to be dangerous, it just needs to be convincing. How has the cybersecurity landscape changed over the past five years? What trends should startups keep an eye on? The past five years have been transformational. The biggest disruptor has been AI and, again, it's a double-edged sword. AI is helping us build smarter, more efficient cybersecurity tools that automate detection and response. But on the flip side, attackers are using the same AI to supercharge their campaigns. Another major shift is that every new technology introduces new vulnerabilities. AI, blockchain, IoT they all come with their own security challenges. And often, organizations adopt these technologies faster than they can secure them. Finally, governmental and regulatory forces are playing a bigger role. From GDPR to CCPA and now the Cyber Resilience Act, we're seeing a global trend toward mandatory cybersecurity compliance. This is actually a good thing it forces businesses to maintain at least a minimum viable security posture. Should cybersecurity be a legal responsibility for startups, or is that too ambitious at an early stage? In an ideal world, yes, cybersecurity would be a legal responsibility for every business, regardless of size. But in the real world, especially for startups, it's complicated. Startups often don't have the budget or the team to build a full-fledged cybersecurity framework. As a founder myself, I know how tough it is, cybersecurity can feel like a luxury when you're trying to stay afloat. But that doesn't mean startups are off the hook. What I believe and advocate is a shared responsibility model. Cybersecurity shouldn't be one person's job. Everyone, from founders to interns, should be aware of the basic principles of digital safety. Startups may not be able to do everything, but they can start with the basics: secure passwords, multi-factor authentication, data access control, and regular backups. These don't cost much but can go a long way. How do global data regulations like GDPR, CCPA, and the Cyber Resilience Act shape the way startups operate? They're reshaping the mindset and that's crucial. A few years ago, cybersecurity was often viewed as a luxury. Many smaller companies thought, 'Why would anyone target us?' That thinking no longer holds. These regulations are forcing accountability. They're saying: If you're collecting user data, you're responsible for securing it. No exceptions. And that accountability builds trust not just with regulators, but with customers. What these regulations have done is establish a baseline culture of cybersecurity. Even if a company isn't directly under the purview of something like GDPR, they often adopt the practices anyway to future-proof their operations. This is especially important as startups scale globally. Do you believe governments should impose stricter cybersecurity regulations on startups, or offer more support instead? Support first, regulations later. Imposing strict rules too early can backfire. Startups, already stretched thin, might try to find workarounds just to stay in business. What governments should do instead is invest in capacity-building offer grants, training programs, and subsidized tools. Help small businesses adopt best practices without breaking their budgets. Once there's a baseline maturity in the ecosystem, then phase in stricter compliance rules. This layered or phased approach is more sustainable and more effective in the long run. There's talk of a cybersecurity talent shortage. Is it really that hard to find skilled professionals? There's no shortage of interest but there is a gap between certifications and real-world skills. Many candidates have credentials but lack hands-on experience. Startups, in particular, need practical problem-solvers, not just textbook experts. What we need more of are experiential learning platforms, internships, cyber ranges, environments where people can learn by doing. For founders, my advice is to hire based on potential and adaptability. You might not be able to compete with tech giants on salary, but you can offer learning, autonomy, and purpose, which many securities professionals' values just as much. If you could give one piece of cybersecurity advice to every new founder, what would it be? Don't let lack of budget stop you from doing something. There are tons of free and low-cost resources out there from SANS to OWASP to NIST guidelines. You can absolutely build a minimal, but meaningful, cybersecurity foundation even if you're bootstrapping. Treat cybersecurity like any other critical function, your dev team, your HR, your marketing. It's not optional anymore. Even a basic security hygiene culture can drastically reduce your risk. Do you think cybersecurity will eventually be seen as a fundamental utility, as essential as electricity or water? Without a doubt. We already rely on digital infrastructure for everything, finance, healthcare, transportation, energy. If any of these go down due to a cyberattack, the consequences are devastating. Cybersecurity is no longer just about protecting data. It's about protecting lives and national security. We're also seeing how cyber warfare is becoming a central strategy in geopolitical conflicts. So yes, cybersecurity will and should, become a default layer of modern society. It's the new electricity. Invisible, but absolutely essential. Vivek Chandran's message to founders is clear: cybersecurity is a necessity, not a luxury. Startups may face budgetary and staffing constraints, but that's no excuse for ignoring the risks. From AI-driven threats to phishing scams and regulatory pressures, the cyber battlefield is real, and unforgiving. Fortunately, knowledge is power. And as Vivek points out, the tools to get started are already out there, many of them free. For founders in 2025, the goal isn't perfection, it's proactive protection

Fortinet Reveals 2025 OT Cybersecurity Report Findings
Fortinet Reveals 2025 OT Cybersecurity Report Findings

TECHx

time14-07-2025

  • TECHx

Fortinet Reveals 2025 OT Cybersecurity Report Findings

Home » Emerging technologies » Cyber Security » Fortinet Reveals 2025 OT Cybersecurity Report Findings Fortinet® (NASDAQ: FTNT), announced the findings of its global 2025 State of Operational Technology and Cybersecurity Report. The report presents insights into the current state of operational technology (OT) cybersecurity. It also highlights key trends, challenges, and best practices for securing IT and OT environments. According to Fortinet, organizations are showing greater maturity in OT cybersecurity. The assignment of OT risk responsibilities to executive leadership, especially the CISO or CSO, has significantly increased. In 2025, 52% of organizations reported the CISO/CSO now oversees OT security, up from 16% in 2022. 'The seventh installment of the Fortinet State of Operational Technology and Cybersecurity Report shows that organizations are taking OT security more seriously. We see this trend reflected in a notable increase in the assignment of responsibility for OT risk to the C-suite, alongside an uptick in organizations self-reporting increased rates of OT security maturity,' said Nirav Shah, Senior Vice President, Products and Solutions, at Fortinet. 'Alongside these trends, we're seeing a decrease in the impact of intrusions in organizations that prioritize OT security. Everyone from the C-suite on down needs to commit to protecting sensitive OT systems and allocating the necessary resources to secure their critical operations.' Fortinet revealed that self-reported OT security maturity is improving. At Level 1 maturity, 26% of organizations have implemented visibility and segmentation, compared to 20% last year. Most organizations now fall under Level 2, involving access and profiling. The company reported a decline in the impact of cyber intrusions. Notably, operational outages that impacted revenue dropped from 52% to 42%. Organizations with higher OT maturity levels are facing fewer attacks or are better prepared to respond to basic threats like phishing. Fortinet also highlighted that adopting cybersecurity best practices, such as cyber hygiene and employee training, has led to a significant reduction in business email compromise. There has also been a notable increase in the use of OT-specific threat intelligence. The report showed that vendor consolidation is a sign of growing cybersecurity maturity. In 2025, 78% of organizations are working with one to four OT vendors, compared to previous years. Fortinet reported that its platform approach resulted in a 93% reduction in cyber incidents and a 7x improvement in setup and triage performance. Key recommendations in the report include: Establish visibility and compensating controls for OT assets. Deploy segmentation aligned with standards like ISA/IEC 62443. Integrate OT into SecOps and incident response plans. Adopt a platform-based security architecture. Use OT-specific, AI-powered threat intelligence. Fortinet's report is based on a global survey of over 550 OT professionals. Respondents came from industries including manufacturing, healthcare, energy, oil and gas, and utilities. Participants were from countries such as the U.S., UK, Germany, India, Japan, and others. Most respondents are actively involved in cybersecurity purchasing decisions or OT operations. Fortinet continues to emphasize the need for executive-level commitment and strategic investment to protect critical OT systems and infrastructure.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store