Sunday, April 5, 2026
Home Blog Page 3102

CYBER SECURITY

Cyber security by way of simple definition is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
These types of malicious attacks cripple companies and governments alike across the globe. Around the world numerous investments in cyber security are put in place due to the sensitivity of the matter.
As a result, security firms have sprung up in order to provide the much-needed protection of crucial data that can be detrimental when placed in wrong hands. One such company that has maintained a golden standard when it comes to security needs is Check Point. Pankaj Bhula leads Check Point’s EMEA as Regional Director for Africa. Pankaj has an experience spanning over 25 years in the Digital Technology Industry, both locally and internationally, which includes the likes of working for IBM, Dimension Data, Microsoft and SAP. Capital got hold of Pankaj for an in-depth insight. Excerpts;

Capital: How was Check Point Software founded and what services does it provide at its core?
Pankaj Bhula: Established by CEO Gil Shwed in 1993, Check Point introduced FireWall-1, the IT industry’s first stateful inspection firewall technology. Over a quarter of a century later, Check Point’s ground-breaking technology remains the gold standard for network security, and the company has continued to deliver innovative cybersecurity solutions.
Check Point innovation begins by understanding customers and their evolving security needs. Today, our leading-edge technologies secure networks, enterprise multi-cloud environments, and endpoint and mobile devices.
Check Point is the only vendor to provide a fully consolidated cyber security architecture that provides unprecedented protection against 5th Generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats.
Check Point’s Infinity Gen V security architecture is a unified platform that has three core solution pillars, supported by automatic, real-time threat intelligence uncompromised security. The three pillars comprise Gen V threat prevention across enterprise mobile (Harmony), cloud (CloudGuard), and network and data center environments (Quantum).
Check Point’s history with preventative solutions uniquely combines policy, people, and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Check Point provides comprehensive and cutting-edge cyber security technology to more than 100,000 organizations of all sizes and millions of users around the globe. Our foundation for success is our customer-driven philosophy, our continuous technological innovation, as well as our relentless focus to provide comprehensive, innovative security throughout the world.

Capital: Describe for us the remarkable Check Point Cyber Security Jumpstart Programme with regards to its initiatives, recent accomplishments as well as the in-depth modules offered in the programme.
Pankaj Bhula: Jump Start is a free series of world-class online training and accreditation courses helping cyber security and network professionals develop their skills and close the cyber skills gap. Available on online platforms like edX, Udemy, Cyberary and Coursera, these are aimed at upskilling security and IT administrators on cyber-threats and security management across mid-size and larger enterprise networks.
Check Point’s world-class eLearning training and accreditation courses are compatible with industry programs such as ISC2, ISACA, CompTIA and CPE. Students will earn up to 60 CPE credits to renew their Cyber Security certification, and Check Point Partners will earn “Engage Points”. Upon completing the free training programme, exams and certificates of completion are awarded. The knowledge acquired in these courses can be used by professionals who are looking to advance their skills and knowledge in their current role or professionals who are looking to better position themselves for their next role.
Modules on the course include:
Check Point Jump Start: Network security – this course introduces Check Point’s Network Security solution. The module encompasses learning how to configure, deploy, manage, and monitor Check Point on a chosen network.
Check Point Jump Start: Small/Medium Business – this course teaches students about the Check Point Small/Medium Business Network Security solution, a cost-effective way to implement the full suite of Check Point access control and zero-day threat prevention features to protect a business.
Check Point Jump Start: Maestro Hyperscale Network Security – In this course, students learn about the Check Point Maestro Hyperscale Network Security solution, an innovative way to simplify a network security workflow orchestration and seamlessly scale up existing security gateway infrastructure on demand.
Check Point Jump Start: Cloud Security – This provides training in Check Point CloudGuard, a comprehensive cloud security portfolio, designed to prevent the latest fifth generation (Gen V), multi-vector cyberattacks targeting enterprise cloud services.
Check Point Jump Start: Product Deployment- In this course, students learn the concept of software deployment and the methods and tools used for deployment of Check Point products. And, drills down into each deployment tool, providing an overview of how to use it given a common use case.
To date, Check Point Software has trained over 20000 students and cyber security professionals across Africa in the Check Point Jump Start programme to address the demand for skills in cyber security in the IT industry.

Capital: In this day and age, there are many young people under the age of 18 interested in technology with self-taught coding skills. What is the eligibility of acceptance for the Check Point cyber security jumpstart programme for such brilliant minds? Similarly, do you have such initiatives for the early bird pen testers?
Pankaj Bhula: Thanks to the flexibility of online courses, everyone can take advantage of these web-based platforms to progress their education outside of the traditional classroom. The programme enables maximum flexibility to learn from anywhere at any time.
Check Point Hacking Point is a new Global Education program to help master all types of Pen Testing techniques and Cyber Security practices. This program is relevant to administrators, SOC analysts, entry level/intermediate level penetration testers, and network engineers.
The goal of this program is to provide students with deep knowledge in cutting-edge Cyber Security threats. After completing the program, participants will understand how to better protect the corporate network and resources.

Capital: As Check Point Software Technologies LTD what are some of the strategies you have employed to increase security efficiency?
Pankaj Bhula: Our mission is to provide any organization with the ability to conduct their business on the internet with the highest level of security. We address organizations’ most imminent cyber security needs based on three core principles:
Prevention-first approach – deploy pre-emptive user protections to eliminate threats before they reach the users
Gold Standard Management – single pane of glass to manage the entire security estate
Consolidated Solution – realize complete, preemptive protection against the most advanced threats while achieving better operational efficiency
To make our vision a reality, in 2021 we have recalibrated our Infinity portfolio of products to focus on those technologies and capabilities that will provide uncompromised security based on our three core principles. Check Point has taken over 80 products and technologies and organized them into three main pillars: Check Point Harmony (full preventative protection for remote users), Check Point CloudGuard (consolidated security and threat prevention across all cloud environments, assets, and workloads), and Check Point Quantum (the most complete network security solution for every organization, perimeter, and datacenter). These are all managed by Infinity-Vision, the industry’s leading unified security management solution.

Capital: How would you describe the Cyber Security space in Africa? Does Africa have the right governance strategy to minimize cyber risk in comparison to other parts of the world?
Pankaj Bhula: The 2021 Cyber Security Report shows how hackers and criminals exploited COVID-19 pandemic in 2020 to target all business sectors around the world with the key tactics including cloud exploits to phishing and ransomware. Cybercrime is on the rise and Africa is not excluded.
It is predicted Africa’s digital economy is set to grow to almost $180 million by 2025, with this expansion in online technology increasing the risk of cyberattacks. However, many African member countries still lack proper policies and strategies to combat cybercrime. On the continental level, in 2014, the African Union adopted the Convention on Cybersecurity and Personal Data Protection. However, only 14 of the 55 African Union member countries had signed the convention, and only seven ratified it, by January 2020.
While there are signs of cybersecurity legislation and enforcement measures on the continent gradually improving, we are in an era sophisticated type Gen V attacks, and today’s organisations need to maintain a minimum Gen VI security portfolio to transact in this new digital world of cloud and mobility.

Capital: Check Point Cyber Secure Academy recently partnered with Addis Ababa University, what are the benefits of the partnership?
Pankaj Bhula: This partnership shares a common goal, to promote and enhance educational and career opportunities in the IT sector for students not only in Africa but around the world. Addis Ababa University is one of the top universities in Africa and largest university in Ethiopia, and this programme provides a comprehensive cyber security program to students, by integrating world-class cyber security training through the Cyber Secure Academy courses while integrating current university curricula. Completing the course gives students industry-recognised certifications in cyber security skills, helping to equip the next generation of cyber-warriors with the skills they need to succeed in the industry.

Capital: How do you describe Africa’s readiness to cybercrimes?
Pankaj Bhula: Africa is firmly in the crosshairs of cyber criminals. Every day, the continent’s people, countries and companies are targeted by internal and external attackers bent on stealing data and money. The scope of these activities is staggering and deserves closer attention. According to Check Point Research’s Threat Intelligence Report for Africa, at the beginning of this year, the region saw an average of 1 293 weekly cyber-attacks on African companies, compared to just 485 attacks per organisation globally.
The most targeted country was reported as Angola, and the top malware, Emotet, impacting 13% of organisations in Africa. Perhaps more critically is that 87% of malicious files in Africa are delivered via e-mail, which lets us believe that there is still a fair amount of education that organisations need to do to improve their security defenses. A common method used by cyber criminals is sending remote code execution files, with the report showing that over 61% of organisations have fallen prey to this type of attack.
Why is Africa such a favored target? It is tempting to point to the continent’s incredibly high mobile-phone penetration, though experts note that most of these are feature phones and thus not really a cybercrime interest. Instead, attacks on smart devices in Africa are comparable in type and numbers to other regions, despite a much higher user number. This indicates that the average person in the street often does not interact with the staging areas criminals could use, such as compromised app stores or mobile device management environments.
Instead, it is crucial to note that the attacks used on African targets are the same as seen elsewhere. The situation is not unique. Perhaps the higher prevalence of local attacks point to shortcomings in preparedness and technology investments.
The higher attack rates are in part because consumers and businesses do not have the latest technologies with the best security on them, and secondly, because there is a lack of general awareness around security in less developed regions. Thirdly, because of the growing demand for digital and cloud-based services. The reality is that the security solutions do exist, but there is simply a lag in uptake.
Cost is a contributing factor. As an emerging economy, Africa often does not have the disposable income to spend on constant technology refresh cycles. Numerous businesses rely on legacy on-premises environments that, in some instances, have passed their shelf-life.
When you are sitting on a large vault of legacy solutions that are difficult to upgrade and maintain – your security also suffers.
Africa, of course, is not a country. Cyber-attacks don’t happen equally across its landscape. Countries like South Africa, Kenya, Nigeria and Angola receive much more attention from criminals, attracted to digital maturity, diverse industries and large corporate landscapes. In particular, South Africa is a big fish – according to Accenture, it has the third most cybercrime victims worldwide, losing 2.2 billion South African Rand a year. But such economies are also more likely to invest in better security.

Ethiopian launches high-end COVID-19 testing lab at its hub

0

Ethiopian Airlines Group, Africa’s leading Airline, is pleased to announce that it has joined hands with BGI Health Ethiopia, a subsidiary of China’s biotech giant, the BGI Genomics Co., Ltd, to launch high-end COVID-19 testing laboratory at its main hub and the continent’s busiest airport, Addis Ababa Bole International Airport. The testing center is opened to revitalize the passengers’ business by creating seamless travel experience that includes COVID-19 testing to passengers that are departing or transiting via Addis Ababa.
The state-of-the-art COVID-19 testing lab is equipped with cutting-edge technologies to provide quick and accurate testing for passengers. Currently, the lab has a capacity to carry out 1,000 COVID-19 tests a day with a potential to grow further after expansion. Regular test results can be obtained within three hours, leading to a convenient travel arrangement by reducing waiting time for testing and result collection.

The economics of cloud seeding

Water is one of the most basic commodities on earth sustaining human life. In many regions of the world, traditional sources and supplies of ground water, rivers and reservoirs, are either inadequate or under threat from ever increasing demands on water from changes in land use and growing populations. Only a small part of the available moisture in clouds is transformed into precipitation that reaches the surface. This has prompted scientists and engineers to explore the possibility of augmenting water supplies by means of cloud seeding.
Conrad Keyes in his book entitled “Guidelines for Cloud Seeding to Augment Precipitation” stated that cloud seeding is a process that utilizes chemicals that are freed into the environment to amplify the water amount in the air in order to create a fog or precipitation and hail. These chemicals usually consist of Silver Iodide Potassium Iodide and dry ice and they are usually found in regions with a lot of mountains. Liquid propane has also been used due to its ability to change from liquid to gas. They aid in cloud condensation and changing the microphysical procedures that take place within the cloud.
In layman terms, cloud seeding is simply an artificial way of modifying the weather with the aim of influencing the amount or type of precipitation in an area from the clouds. It changes the cloud and rain formation processes. It is a good thing considering that sometimes people may need more rain while other times, less rain. However, all that is good also comes with its downside.
In his response to the queries of Parliamentarians on 27 March, Prime Minister Abiy Ahmed said the rain that showered in the previous couple of weeks was the result of cloud seeding technology that the government introduced as part of the overall efforts to modernize various sectors and assist performance through modern technology. He recalled that the government has already enabled the country to possess two space satellites, efforts are also underway to apply Artificial Intelligence. Prime Minister Abiy also Tweeted “Over the past few weeks we have been experimenting with cloud seeding technologies and will officially launch soon, to augment rainfall. As our population increases and demands on land increase, such techniques will make dry places more livable and productive”.
It was indeed true for many Ethiopians that cloud seeding came as breaking news when PM Abiy Ahmed addressed Members of Parliament about the government’s performance in the technology sector.
Conrad Keyes noted that during the last 10 years there has been a thorough scrutiny of past experiments involving experiments using glaciogenic seeding. Although there still exists indications that seeding can increase precipitation, a number of recent studies have questioned many of the positive results, weakening the scientific credibility. As a result, considerable skepticism exists as to whether these methods provide a cost-effective means for increasing precipitation for water resources.
Recent results from hygroscopic seeding experiments provided for some renewed optimism in the field of precipitation enhancement. Although promising results have been obtained to date, some fundamental questions remain that need to be answered in order to provide a sound scientific basis for this technology.
Arnett Dennis in his book entitled “Weather Modification by Cloud Seeding” explained that a rainstorm occurs after moisture collects around naturally occurring particles in the air like dust sand, causing the air to reach a level of saturation point at which it can no longer hold in that moisture and droplets fall in the form of rain. Cloud seeding essentially helps that process along, providing additional “nuclei” around which water droplet can reside and condensation occurs. These nuclei can be salts, dry ice or silver iodide. The most common chemicals used for cloud seeding include silver iodide, potassium iodide and dry ice (solid carbon dioxide). Liquid propane, which expands into a gas, has also been used.
According to Arnett Dennis, there are three methods by which cloud seeding is done: Static cloud seeding; Dynamic cloud seeding and Hygroscopic cloud seeding. Static method involves spreading a chemical like silver iodide into clouds. The silver iodide provides a crystal around which moisture can condense. The moisture is already present in the clouds, but silver iodide essentially makes rain clouds more effective at dispensing their water. Physical studies and inferences drawn from statistical seeding experiments suggest that there exists more limited window of opportunity for precipitation enhancement by the static mode of cloud seeding than originally thought.
The window of opportunity for cloud seeding appears to be limited to the static mode of cloud seeding has been shown to cause the expected alterations in cloud microstructure including increased concentrations of ice crystals, reductions of super cooled liquid water content, and more rapid production of precipitation elements in both cumuli and orographic clouds.
This limited scope of opportunities for rainfall enhancement by the static mode of cloud seeding that has emerged in recent years may explain why some cloud seeding experiments have been successful while others have yielded inferred reductions in rainfall from seeded clouds or no effect. A successful experiment in one region does not guarantee that seeding in another region will be successful unless all environmental conditions are replicated as well as the methodology of seeding.
Dynamic cloud seeding aims to boost vertical air currents, which encourages more water to pass through the clouds, translating into more rain. Up to 100 times more ice crystals are used in dynamic cloud seeding than in the static method. The process is considered more complex than static clouding seeding because it depends on a sequence of events working properly.
Cloud seeding has a number of economic advantages. Louis Battan in his book entitled “Cloud physics and cloud seeding” stated the first and foremost advantage of cloud seeding is it creates rain. Where rain is badly needed, cloud seeding is perhaps the only way to produce rain. People use silver iodine to induce rain production in areas where there is barely any precipitation. Rain is important for keeping the area hydrated and fertile for growing crops and other plants.
Cloud seeding boosts economy. Where there is rain, there is farm produce. Farms that yield better can help the local economy and feed the people and even animals. Cloud seeding can greatly improve the living conditions in dry, arid places. Cloud seeding may help to optimize crop yields. Since farmers can use cloud seeding whenever they need increasing levels of precipitation for their plants, those plants will be supplied with water in an optimal manner and can also grow much better compared to a state where those plants would be exposed to serious droughts. In turn, chances are that also the crop yields of farmers could be increased significantly, which would lead to higher profits for farmers in the long run.
Cloud seeding regulates weather. Cloud seeding in a way, gives us the ability to control the weather condition in a particular area. It does not just make rain; it also regulates water vapor that in turn prevents damages brought by destructive hails and storms.

To be continued…

Deconstructing Hope

A solo debut photo exhibition named Deconstructing Hope at blue space was opened on Thursday April 22,2021. The exhibition showcases 51 photographs shot by Adane Firde.
The exhibition hosted by Eleni Gebremedhin and Yasser Bagersh, will stay open for the coming 18 days starting up to May 9, 2021.
Most of the pictures try to show day to day life of Ethiopians and also their emotion triggers, as the photographer explains “after taking the picture I always tried to understand all of my subjects just to understand their feelings and to write the perfect caption.”
According to Adane the entire photographs showcased on the exhibition is presented are up for sell with prices ranging from 1,500 birr to 8,500 birr.
Adane Firde is a digital marketer, tour and travel professional and takes his pictures from all over Ethiopia where life takes him.