{"id":114709,"date":"2026-05-01T00:00:00","date_gmt":"2026-05-01T00:00:00","guid":{"rendered":"https:\/\/enterpriseam.com\/menaplus\/?p=114709"},"modified":"2026-05-01T09:36:33","modified_gmt":"2026-05-01T09:36:33","slug":"how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity","status":"publish","type":"post","link":"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/","title":{"rendered":"How geopolitical volatility and AI are reshaping regional cybersecurity"},"content":{"rendered":"<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"> <strong>Geopolitical volatility and the rising prominence of cloud and data infrastructure in<\/strong><strong> businesses are reshaping the regional architecture of cybersecurity. <\/strong>As more businesses move core operations to the cloud (a trend that began well before the war), the data center has replaced localized (office) servers as the main target. <\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>What worked before may not be working now:<\/strong> A war-driven surge of cyberattacks against businesses and infrastructure in our region and beyond means the traditional way of how cybersecurity worked \u2014 often involving managing risks by layering several niche, disconnected tools \u2014 might be at a point of diminishing returns, experts tell us. With AI making the tempo and the nature of attacks unpredictable, chief information security officers (CISOs) are increasingly facing what industry experts call \u201calert fatigue,\u201d which is compounded by the need to manage the disjointed tools they deploy to defend against different types of threats. <\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>You can get your cue from M&A activity in the cybersecurity market:<\/strong> When <a target=\"_blank\" href=\"https:\/\/blog.google\/innovation-and-ai\/infrastructure-and-cloud\/google-cloud\/wiz-acquisition\/\" style=\"\">Google<\/a><a target=\"_blank\" href=\"https:\/\/blog.google\/innovation-and-ai\/infrastructure-and-cloud\/google-cloud\/wiz-acquisition\/\" style=\"\">finalized<\/a> its USD 32 bn acquisition of the AI-native, cloud security provider Wiz in March, it was the latest sign that the model of layering security tools on top of each other could be under duress as new innovators emerge. <\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>\u201cA hyperscaler bought a cloud security specialist, not a traditional security vendor\u2026 <\/strong><strong>That\u2019s the clearest signal of where the market is heading,\u201d<\/strong> cloud infrastructure and security specialist Jeff Cooper tells EnterpriseAM. By promising an AI-native, cloud-based platform that centralizes the fragmented security tools stack, the Israeli-born startup is pitching a new model that is able to deal with the new landscape of threats by providing \u201ca unified security platform that improves the speed with which organizations can detect, prevent, and respond to threats.\u201d<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\">\n<p class=\"tag-border-left\">The risk landscape<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>What was already here, just amplified:<\/strong> <a target=\"_blank\" href=\"https:\/\/www.cloudflare.com\/learning\/ddos\/what-is-a-ddos-attack\/\" style=\"\">Distributed denial-of-service (DDoS)<\/a> remains the opening move of any geopolitical flare-up. DDoS volumes rose eightfold in the first half of March, according to StormWall data that EnterpriseAM has seen. \u201cIranian-aligned actors have reportedly used it as a first layer to create disruption and divert attention while conducting more serious attacks behind the scenes, including data exfiltration, wiping, infrastructure targeting, or coordinating with physical attacks,\u201d Pam Lindemoen, Retail and Hospitality Information Security and Analysis Center (RH-ISAC) Chief Security Officer, tells EnterpriseAM.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>The targeting of national infrastructure follows the same long-running playbook:<\/strong> <a target=\"_blank\" href=\"https:\/\/www.radware.com\/security\/threat-advisories-and-attack-reports\/ddos-activity-following-operation-epic-fury-roaring-lion\/#menu-tab-company\" style=\"\">53% of<\/a><a target=\"_blank\" href=\"https:\/\/www.radware.com\/security\/threat-advisories-and-attack-reports\/ddos-activity-following-operation-epic-fury-roaring-lion\/#menu-tab-company\" style=\"\">attacks<\/a> in the war\u2019s first days hit government institutions, dominated by DDoS, defacements, and claimed data breaches. Infrastructure attacks have become a tool of <a target=\"_blank\" href=\"https:\/\/flashpoint.io\/blog\/escalation-in-the-middle-east-operation-epic-fury\/\" style=\"\">decentralized<\/a> retaliation and economic pressure.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>And we\u2019re seeing the rise of proxy targets<\/strong>, with retail and hospitality becoming an obvious target given the visibility generated by any disruptions in these sectors. \u201cBy impacting these high-visibility sectors like retail and hospitality, hacktivists aim to translate geopolitical tensions into tangible economic and public-facing disruptions,\u201d Lindemoen tells us. <\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>What's genuinely new: <\/strong>Three shifts stand out. The first is <strong>tempo and targeting specificity<\/strong> in the Gulf region, particularly from Iran-linked organizations over the past several years, Cooper tells us. The second is the rise of AI-driven novelties, with attacks that don\u2019t match most existing detection signatures. \u201cThere\u2019s no playbook.<strong> There\u2019s no pattern to match<\/strong>,\u201d Cooper says, marking a sharp break from traditional security operations centers, which are largely built around pattern recognition. The third is the appearance of <strong>credible physical threats against civilian cloud infrastructure <\/strong>(aka data centers), a development Cooper frames as \u201cunprecedented\u201d given how current protections in place are inadequate. \u201cThat gap between the physical threat and the physical defense posture is where I think the real exposure lives right now,\u201d he adds.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>The new normal:<\/strong> The threat baseline established during this surge is not going to recede, experts tell us. \u201cThe cyber war did not begin with the military conflict, and it will not end with any military ceasefire,\u201d Lindemoen says, noting that many Iran-aligned threat groups operate outside direct state control and are therefore not always bound by ceasefire agreements. \u201cThis is the new normal for the foreseeable future,\u201d Lindemoen adds. EFG Hermes Group CISO Osama Hijji is blunter: \u201cThe truth is, we are under attack around the clock, 24\/7, every minute and every second.\u201d <\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>The pre-war signal was also clear well in advance<\/strong> \u2014 cyber attacks surged days before bombs started dropping, affecting government and financial services, according to CloudSek. \u201cThe cyber war started about 11 days before the physical war did, for instance \u2014 and because we have offices in the Gulf, we started seeing attacks hitting our perimeter there,\u201d Hijji tells us.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>If the truce materializes (and holds)?<\/strong> \u201cWe have no truce; cyber warfare continues and never stops,\u201dHijj adds.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\">\n<p class=\"tag-border-left\">AI is now both the weapon and the shield<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>The reason layered defenses are buckling against this new threat profile is, in large part,<\/strong><strong> AI.<\/strong> The technology is simultaneously accelerating attacks and becoming indispensable to defense, and the asymmetry between the two is what's reshaping the architecture beneath every security system. <\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>On the offensive side, AI is enabling attacks that don\u2019t fit any established pattern.<\/strong> Hijji described one incident at EFG Hermes in which attackers attempted to feed a customer-facing AI chatbot manipulated information and links, prompting the model to \u201clure customers into something the attacker designed\u201d \u2014 a class of attack that didn't exist a generation of security tooling ago. The Iran-linked Handala campaign against Stryker in March is the other end of the spectrum: A credential-driven attack \u2014 a simple but efficient type of attack as old as cybersecurity as a field. <\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>On the defensive side, AI is being baked into the security layer rather than bolted on top.<\/strong> Cooper describes the architectural shift toward AI-native security as moving toward integrated and centralized capabilities that could keep organizations resilient over the next three to five years. <\/p>\n<p><strong>But confidence in AI-leveraged defense is building up at a slower rate than AI-powered <\/strong><strong>attacks \u2014 and for good reason. <\/strong>\u201cAs confidence builds and track records get established, the industry will gradually extend the boundaries of what AI is allowed to do autonomously. But we\u2019re not there yet, and pretending we are is how you end up with an AI-driven outage that wasn\u2019t necessary,\u201d Cooper explains.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>How does the use of AI look on the defense side? It\u2019s all about automation<\/strong> \u2014 and AI needs to get better with fewer false positives and false negatives so that automation can scale. \u201cIf AI detects activity on a specific low-risk server or component, letting it act without a human is defensible. But major changes to production, configuration changes that affect multiple systems, or shutting down a critical component absolutely require a human,\u201d Cooper says. For now, a reasonable bridge to maximize AI potential would be to allow it to \u201cidentify a potential event, then hand off to a human with a scripted, predictable response,\u201d he adds. <\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>But the balance of power is tilted towards attackers, <\/strong>an asymmetry that keeps every CISO up at night. \u201cIt\u2019s easier to find a novel offensive use of AI than it is to build a reliable defense against one,\u201d Cooper says. \u201cYou\u2019re often waiting on a vendor, or building it yourself, and either way, your legacy systems may not plug into AI tooling without a meaningful technology refresh first,\u201d he adds. That means the pace of AI-enabled attacks far outpaces cyber defenders\u2019 ability to build new protections. \u201cThat gap is the real problem,\u201d Cooper tells us. <\/p>\n<p><strong>And that asymmetry is precisely why the market is consolidating on cloud-native, AI-first <\/strong><strong>security platforms<\/strong> \u2014 the only architecture with the promise of data scale and update velocity to keep the gap from widening.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Humans, meanwhile, are not out of the loop, but their role is being redefined.<\/strong> \u201cHuman in the loop isn\u2019t a single rule applied uniformly. It\u2019s a sliding scale tied to the consequence of the action,\u201d Cooper says. AI can autonomously handle low-risk anomalies on a single server, but major changes that touch multiple systems still need human judgment. AI also gets it wrong in both directions with false positives and false negatives. <\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>And what is our region doing about it? We know Saudi <\/strong><strong>Arabia <\/strong><strong>and the UAE are going all <\/strong><strong>in on AI-leveraged security. <\/strong>In Saudi Arabia, 15% of all AI research output focuses on security, privacy, and cryptography \u2014 the highest within-country ratio globally, according to the Stanford Institute for Human-Centered Artificial Intelligence\u2019s <a target=\"_blank\" href=\"https:\/\/hai.stanford.edu\/ai-index\/2026-ai-index-report\" style=\"\">2026 AI Index Report<\/a>. The UAE comes third globally after India, with 12% of its AI research output focused on these segments. <\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\">\n<p class=\"tag-border-left\">A new-ish defense playbook\u2026 and a bigger bill<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>What\u2019s next? <\/strong>As the trends of AI-driven attacks and the centrality of the cloud in business operations becomes more cemented, CISOs need to get their house in order to address the mix of old and new threats. This will require CISOs to build their defenses on three non-negotiable strategic pillars that move beyond the layering philosophy of the last decade.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>#1- Treating credentials as the most likely point of failure.<\/strong> \u201cCredential security remains the most common and most underestimated exposure in enterprise security today,\u201d Cooper says. He recommends consolidating on a dedicated identity provider, on the logic that identity vendors prioritize hardening as their core business in a way general-purpose infrastructure does not. The Stryker breach is the cautionary tale: stolen credentials, exploited at scale.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>#2- Consolidating rather than sprawling \u2014 and this is where players like Wiz come in.<\/strong> Maintaining discipline across many disparate tools is harder than across a unified platform. \u201cThoughtful consolidation on trusted specialist vendors almost always beats vendor sprawl,\u201d Cooper says. Maintaining discipline across many disparate tools is harder than across a unified platform, he adds. <\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>The third is building for compartmentalization<\/strong>. Cooper's analogy is the Titanic: \u201cThe Titanic lacked adequate isolation. One catastrophic breach, and water moved freely through the entire hull.\u201d The fix in shipbuilding was compartmentalization, and the same logic now governs cloud-native security architecture \u2014 contain the breach so it doesn't spread.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>We are yet to see how building cyber defenses on similar pillars could impact budgets, <\/strong>largely because AI is yet to deliver on its potential to cut costs in so many other sectors. Firms like Uber are already reporting ballooning AI costs, and there is the risk that the compute cost required for AI-driven defense could end up exceeding the human salary lines they were meant to displace.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>But so far, CISOs are expecting their budgets to change more in shape than in size. <\/strong>Security spending rose from 0.57% to 0.75% of revenue in 2025, while IT spending climbed from 3.2% to 3.9%, according to the RH-ISAC\u2019s <a target=\"_blank\" href=\"https:\/\/rhisac.org\/press-release\/ciso-benchmark-2026\/\" style=\"\">2026 CISO Benchmark<\/a> Report. 54% of surveyed CISOs expect incremental budget increases this year \u2014 a measured rise rather than a step change, and about 90% expect spending on AI-related security to grow, but mostly through reallocation rather than new funds.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As traditional cyber defense faces more AI-powered attacks, businesses could be better off if they ditch fragmented tools for unified AI-native security platforms<\/p>\n","protected":false},"author":1,"featured_media":114710,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"newspack_ads_suppress_ads":false,"newspack_popups_has_disabled_popups":false,"newspack_sponsor_sponsorship_scope":"","newspack_sponsor_native_byline_display":"inherit","newspack_sponsor_native_category_display":"inherit","newspack_sponsor_underwriter_style":"inherit","newspack_sponsor_underwriter_placement":"inherit","ep_exclude_from_search":false,"_primary_brand":0,"newspack_featured_image_position":"","newspack_post_subtitle":"","newspack_article_summary_title":"Overview:","newspack_article_summary":"","newspack_hide_updated_date":false,"newspack_show_updated_date":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2608],"tags":[2538,2563,2812,2607,2562],"brand":[],"newspack_spnsrs_tax":[],"class_list":["post-114709","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-lede","tag-enterpriseam","tag-saudi-arabia","tag-tech","tag-the-lede","tag-uae","wpautop","entry"],"acf":{"mongo_id":"0565903d-b9d7-4158-9eea-df6495a0fc64","order":"2","is_powered_by":false,"story_type":"1","photo_url":"https:\/\/ent.news\/2026\/5\/18.jpg","photo_position":"above","homepage_title":"","full_issue_title":"Shielding the cloud","related_issue":[114706],"teaser":"As traditional cyber defense faces more AI-powered attacks, businesses could be better off if they ditch fragmented tools for unified AI-native security platforms"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How geopolitical volatility and AI are reshaping regional cybersecurity - MENA+ Edition<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How geopolitical volatility and AI are reshaping regional cybersecurity\" \/>\n<meta property=\"og:description\" content=\"As traditional cyber defense faces more AI-powered attacks, businesses could be better off if they ditch fragmented tools for unified AI-native security platforms\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"MENA+ Edition\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-01T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-01T09:36:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/ent.news\/2026\/5\/18.jpg?fit=%2C&ssl=1\" \/>\n<meta name=\"author\" content=\"enterpriseam admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"enterpriseam admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/\"},\"author\":{\"name\":\"enterpriseam admin\",\"@id\":\"https:\/\/enterpriseam.com\/menaplus\/#\/schema\/person\/ca597032db7e4db868359c123cec256d\"},\"headline\":\"How geopolitical volatility and AI are reshaping regional cybersecurity\",\"datePublished\":\"2026-05-01T00:00:00+00:00\",\"dateModified\":\"2026-05-01T09:36:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/\"},\"wordCount\":1790,\"publisher\":{\"@id\":\"https:\/\/enterpriseam.com\/menaplus\/#organization\"},\"image\":{\"@id\":\"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/ent.news\/2026\/5\/18.jpg?fit=%2C&ssl=1\",\"keywords\":[\"EnterpriseAM\",\"Saudi Arabia\",\"TECH\",\"The Lede\",\"UAE\"],\"articleSection\":[\"THE LEDE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/\",\"url\":\"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/\",\"name\":\"How geopolitical volatility and AI are reshaping regional cybersecurity - MENA+ Edition\",\"isPartOf\":{\"@id\":\"https:\/\/enterpriseam.com\/menaplus\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/ent.news\/2026\/5\/18.jpg?fit=%2C&ssl=1\",\"datePublished\":\"2026-05-01T00:00:00+00:00\",\"dateModified\":\"2026-05-01T09:36:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/ent.news\/2026\/5\/18.jpg?fit=%2C&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/ent.news\/2026\/5\/18.jpg?fit=%2C&ssl=1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/enterpriseam.com\/menaplus\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How geopolitical volatility and AI are reshaping regional cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enterpriseam.com\/menaplus\/#website\",\"url\":\"https:\/\/enterpriseam.com\/menaplus\/\",\"name\":\"MENA+ Edition\",\"description\":\"MENA+ Edition\",\"publisher\":{\"@id\":\"https:\/\/enterpriseam.com\/menaplus\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enterpriseam.com\/menaplus\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enterpriseam.com\/menaplus\/#organization\",\"name\":\"MENA+ Edition\",\"url\":\"https:\/\/enterpriseam.com\/menaplus\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enterpriseam.com\/menaplus\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ent.news\/internal\/42998.svg\",\"contentUrl\":\"https:\/\/ent.news\/internal\/42998.svg\",\"caption\":\"MENA+ Edition\"},\"image\":{\"@id\":\"https:\/\/enterpriseam.com\/menaplus\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enterpriseam.com\/menaplus\/#\/schema\/person\/ca597032db7e4db868359c123cec256d\",\"name\":\"enterpriseam admin\",\"sameAs\":[\"http:\/\/enterpriseam.testing.projectsarea.com\"],\"url\":\"https:\/\/enterpriseam.com\/menaplus\/author\/enterpriseam\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How geopolitical volatility and AI are reshaping regional cybersecurity - MENA+ Edition","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"How geopolitical volatility and AI are reshaping regional cybersecurity","og_description":"As traditional cyber defense faces more AI-powered attacks, businesses could be better off if they ditch fragmented tools for unified AI-native security platforms","og_url":"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/","og_site_name":"MENA+ Edition","article_published_time":"2026-05-01T00:00:00+00:00","article_modified_time":"2026-05-01T09:36:33+00:00","og_image":[{"url":"https:\/\/i0.wp.com\/ent.news\/2026\/5\/18.jpg?fit=%2C&ssl=1","type":"","width":"","height":""}],"author":"enterpriseam admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"enterpriseam admin","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/"},"author":{"name":"enterpriseam admin","@id":"https:\/\/enterpriseam.com\/menaplus\/#\/schema\/person\/ca597032db7e4db868359c123cec256d"},"headline":"How geopolitical volatility and AI are reshaping regional cybersecurity","datePublished":"2026-05-01T00:00:00+00:00","dateModified":"2026-05-01T09:36:33+00:00","mainEntityOfPage":{"@id":"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/"},"wordCount":1790,"publisher":{"@id":"https:\/\/enterpriseam.com\/menaplus\/#organization"},"image":{"@id":"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/ent.news\/2026\/5\/18.jpg?fit=%2C&ssl=1","keywords":["EnterpriseAM","Saudi Arabia","TECH","The Lede","UAE"],"articleSection":["THE LEDE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/","url":"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/","name":"How geopolitical volatility and AI are reshaping regional cybersecurity - MENA+ Edition","isPartOf":{"@id":"https:\/\/enterpriseam.com\/menaplus\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/ent.news\/2026\/5\/18.jpg?fit=%2C&ssl=1","datePublished":"2026-05-01T00:00:00+00:00","dateModified":"2026-05-01T09:36:33+00:00","breadcrumb":{"@id":"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/#primaryimage","url":"https:\/\/i0.wp.com\/ent.news\/2026\/5\/18.jpg?fit=%2C&ssl=1","contentUrl":"https:\/\/i0.wp.com\/ent.news\/2026\/5\/18.jpg?fit=%2C&ssl=1"},{"@type":"BreadcrumbList","@id":"https:\/\/enterpriseam.com\/menaplus\/2026\/05\/01\/how-geopolitical-volatility-and-ai-are-reshaping-regional-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/enterpriseam.com\/menaplus\/"},{"@type":"ListItem","position":2,"name":"How geopolitical volatility and AI are reshaping regional cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/enterpriseam.com\/menaplus\/#website","url":"https:\/\/enterpriseam.com\/menaplus\/","name":"MENA+ Edition","description":"MENA+ Edition","publisher":{"@id":"https:\/\/enterpriseam.com\/menaplus\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enterpriseam.com\/menaplus\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enterpriseam.com\/menaplus\/#organization","name":"MENA+ Edition","url":"https:\/\/enterpriseam.com\/menaplus\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enterpriseam.com\/menaplus\/#\/schema\/logo\/image\/","url":"https:\/\/ent.news\/internal\/42998.svg","contentUrl":"https:\/\/ent.news\/internal\/42998.svg","caption":"MENA+ Edition"},"image":{"@id":"https:\/\/enterpriseam.com\/menaplus\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enterpriseam.com\/menaplus\/#\/schema\/person\/ca597032db7e4db868359c123cec256d","name":"enterpriseam admin","sameAs":["http:\/\/enterpriseam.testing.projectsarea.com"],"url":"https:\/\/enterpriseam.com\/menaplus\/author\/enterpriseam\/"}]}},"featured_image_src":"https:\/\/i0.wp.com\/ent.news\/2026\/5\/18.jpg?resize=600%2C400&ssl=1","featured_image_src_square":"https:\/\/i0.wp.com\/ent.news\/2026\/5\/18.jpg?resize=600%2C600&ssl=1","author_info":{"display_name":"enterpriseam admin","author_link":"https:\/\/enterpriseam.com\/menaplus\/author\/enterpriseam\/"},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ent.news\/2026\/5\/18.jpg?fit=%2C&ssl=1","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/enterpriseam.com\/menaplus\/wp-json\/wp\/v2\/posts\/114709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enterpriseam.com\/menaplus\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enterpriseam.com\/menaplus\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enterpriseam.com\/menaplus\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/enterpriseam.com\/menaplus\/wp-json\/wp\/v2\/comments?post=114709"}],"version-history":[{"count":1,"href":"https:\/\/enterpriseam.com\/menaplus\/wp-json\/wp\/v2\/posts\/114709\/revisions"}],"predecessor-version":[{"id":114751,"href":"https:\/\/enterpriseam.com\/menaplus\/wp-json\/wp\/v2\/posts\/114709\/revisions\/114751"}],"acf:post":[{"embeddable":true,"href":"https:\/\/enterpriseam.com\/menaplus\/wp-json\/wp\/v2\/issue\/114706"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enterpriseam.com\/menaplus\/wp-json\/wp\/v2\/media\/114710"}],"wp:attachment":[{"href":"https:\/\/enterpriseam.com\/menaplus\/wp-json\/wp\/v2\/media?parent=114709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enterpriseam.com\/menaplus\/wp-json\/wp\/v2\/categories?post=114709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enterpriseam.com\/menaplus\/wp-json\/wp\/v2\/tags?post=114709"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/enterpriseam.com\/menaplus\/wp-json\/wp\/v2\/brand?post=114709"},{"taxonomy":"newspack_spnsrs_tax","embeddable":true,"href":"https:\/\/enterpriseam.com\/menaplus\/wp-json\/wp\/v2\/newspack_spnsrs_tax?post=114709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}