Building Cyber Resilience in the AI era: Five ways Irish organisations can stay ahead

Artificial intelligence (AI) is rapidly reshaping the cybersecurity landscape across Ireland. While it’s unlocking new efficiencies and accelerating innovation, it’s also giving cybercriminals new evasive tools to launch faster and more sophisticated attacks. Across Ireland, organisations are navigating a new era of cyber risk defined by speed, sophistication, and AI.

As Dell Technologies continues to work closely with Irish businesses to modernise their digital infrastructure, it’s clear that cybersecurity must evolve in tandem, as a strategic enabler of trust and resilience. Threat actors are using AI to enhance ransomware, zero-day vulnerabilities, Distributed Denial of Service (DDoS) all making advanced spear-phishing much harder to identify, outpacing conventional security measuresAccording to the latest Dell Technologies Innovation Catalyst Study, 84% of Irish organisations view security as a key part of their business strategy, yet many continue to struggle with balancing innovation and security.

Almost all respondents (96%) admitted that integrating security into wider business strategies is proving difficult. These figures highlight that organisations must rethink their cybersecurity strategies to adopt proactive, intelligent, and resilient approaches that keep pace with the evolving threat environment.

Here are five ways to stay resilient against cyber threats:

1.Adopt zero trust for AI Security 

As threat actors use AI to scout, steal credentials and adapt attack techniques, traditional perimeter-based defenses fall short.

That’s why more Irish organisations are adopting a Zero Trust model built on the principle of “never trust, always verify” ensuring that every user, device, and application is continuously authenticated, regardless of location.

The benefits are clear, latest Innovation Catalyst Study revealed a 100% increase in confidence levels among Irish organisations that have adopted zero trust principles, underscoring its growing value as a security framework. By implementing zero trust principles organisations can help reduce risk by continuously verifying every access request and implementing strict authentication processes. Using role-based access controls (RBAC) and network segmentation, organisations can minimize the risk of an attack and reduce the impact radius if an attack occurs.

Zero trust is more than a security philosophy. It’s a unified and adaptive strategy for identity and access management. Through a zero trust approach, organisations not only reduce their attack surface, but also strengthen their ability to detect, respond to and contain threats.

2.Reduce the attack surface

In an environment where AI-powered threat actors are constantly probing for weaknesses, reducing the attack surface is a critical line of defense. Every exposed endpoint, unsecured API, or overlooked supply chain vulnerability represents an opportunity for adversaries to infiltrate systems, deploy malware and exfiltrate sensitive data.

To mitigate these risks, Irish organisations should begin with assessing and understanding their attack surface and related vulnerabilities. From there, they should have a layered defense strategy focused on securing entry points and minimising exposure. This includes strengthening authentication, encrypting data, regularly testing for vulnerabilities and actively monitoring endpoints. Keeping systems patched and devices hardened further limits risks.

By reducing the attack surface, organisations make themselves a harder target, thereby decreasing the likelihood of an attack.

3.Continuously detect and respond to threats

AI-powered attacks are capable of mimicking legitimate behavior and evading traditional security tools, and organisations need to combine advanced threat detection with rapid response capabilities.

Leveraging AI and machine learning, organisations can monitor operational data, detect anomalies, and trigger automated responses in real time.

This AI-powered threat intelligence system builds upon itself, making it smarter and better able to identify and address attacks.

For many Irish organisations who need assistance scaling threat detection and response. Partnering with a trusted third-party provider offers round-the-clock monitoring, faster reaction times, and support in managing complex security operations. Dell Technologies continues to invest in AI-driven security solutions that help Irish organisations stay ahead of emerging threats while simplifying operational complexity.

4.Plan an incident response and recovery plan

While prevention is often the first step to a cybersecurity strategy. A strong cybersecurity strategy includes not only prevention, but also a well-defined plan for response and recovery.

Organisations here in Ireland need to create and routinely practice a robust Incident Response and Recovery (IRR) plan that outlines how to detect, contain, communicate and recover from cyber incidents. The plan should outline departmental roles and responsibilities, internal and external contacts and partners, communication protocols and include regular testing. Preapproved messaging templates and routine plan updates are also essential to maintaining operational continuity during a crisis.

Backing up critical data and applications offline or separated from production workloads helps guard it against ransomware attacks and ensures business continuity.

By preparing for disruption, Irish organisations can restore critical functions with resilience, speed, and confidence.

5.Empower employees as a first line of defense

Technology alone isn’t enough; employees remain the most critical line of defense.  Organisations here in Ireland needs to create a culture of vigilance through employee awareness programmes that integrates continuous education, open communication, real-world simulations, and a culture of shared accountability. For example, incorporating attack simulations that reflect AI-specific threats like advanced phishing and deepfakes helps equip employees to recognise and respond to evolving threat actor tactics.

Collaboration across the technology ecosystem also plays a vital role in strengthening cyber resilience. Dell Technologies, together with partners like NVIDIA, is helping organisations better understand how AI-driven attacks evolve.

NVIDIA’s new AI Kill Chain Framework reimagines the traditional Cyber Kill Chain for the AI era, outlining how adversaries target AI systems through stages such as Recon, Poison, Hijack, Persist, and Impact — often cycling through these stages to adapt and escalate their tactics. This framework offers valuable insights into how attackers’ probe, manipulate, and maintain access within AI ecosystems, helping defenders anticipate and disrupt evolving threats before they lead to broader compromise.

As threat actors evolve using AI to launch increasingly sophisticated attacks, organisations must respond with equal force and foresight. Traditional defenses alone are insufficient. A modern cybersecurity strategy demands a proactive, layered approach that integrates advanced technologies, incident response planning, and a vigilant workforce.

As we mark Cybersecurity Awareness Month, it’s an important reminder that AI is transforming both the opportunities and the risks facing Irish businesses, making it more critical than ever to invest in continuous vigilance, awareness, and adaptation. By embedding resilience at every level of their cybersecurity strategy, Irish organisations can better safeguard their operations and lead with confidence in an increasingly AI-driven world.

Half a Million Vulnerabilities Leave Irish Businesses Exposed to Cybercriminals

Centripetal, the global leader in cybersecurity threat intelligence, has exposed critical security gaps leaving hundreds of thousands of Irish networks vulnerable to cyberattack.
Using its proprietary threat intelligence analytics platform, Centripetal has mapped cyberattack entry points across Ireland down to individual IP addresses* and networks, revealing which regions, industries, and organisations face the greatest risk.
The findings are stark:
  • 349,000 Irish networks (3.6% of the total) remain unprotected from active cyber threats.
  • 44% have exposed vulnerabilities.
  • Half a million vulnerabilities exist on exposed assets across Ireland as of September 2025.
  • Dublin faces the highest risk, recording the greatest concentration of vulnerabilities across all industries.
Centripetal’s Attack Surface Map identifies specific attack vectors – the methods cybercriminals use to exploit vulnerabilities and gain unauthorised access to systems, networks, and sensitive data. This granular visibility enables organisations to understand their exact exposure and take immediate action.
The threat is active and escalating:
  • 63% of compromised networks are leveraged to conduct active reconnaissance – attackers are probing systems and planning their strikes through Irish infrastructure
  • 11% are acting as command-and-control centers to coordinate attacks – cybercriminals have already infiltrated these systems and are working to further seize control of other target networks
  • 35% increase in active attacks launched or coordinated through Irish networks since 2024 – the scale of attacks has expanded dramatically as cybercriminals automate campaigns and target vastly more organisations simultaneously by leveraging sophisticated tools and technologies including AI.
This means thousands of Irish organisations are likely under attack right now, many without knowing it.
David Silke, Managing Director, Centripetal Ireland says, “Across Ireland, we can see that there are Critical National Infrastructure organisations that are currently exposed to attack vectors. We can see that the largest attack vector in Ireland at present are the ISPs (Internet service providers – the telecoms and hosting providers). Our technology can drill down to a granular level to show which customers of a particular provider are affected by these vulnerabilities at a street level.
“We’re calling for organisations in Ireland to review their cybersecurity provision and asking them to put more emphasis on the use of threat intelligence to protect themselves. We know that only 20% of organisations currently do this.  At Centripetal, our technology effectively cloaks these vulnerabilities, hiding them from attackers so they can’t be targeted,” says Silke.
CleanINTERNET technology, including its new Fusion product, blocks 99.99% of threats by providing complete network visibility. Unlike traditional solutions that only monitor traffic entering and leaving the network (north-south), Fusion also monitors internal traffic flows (east-west), creating comprehensive protection from every angle.
This dual capability means organizations can now:
  • Stop external threats before they breach the network
  • Detect insider threats by identifying suspicious behavior from internal users and systems
  • Receive real-time alerts when unusual activity occurs, whether from outside attackers or internal sources
 

Unlicensed Software Risks: Why It’s Crucial to License Your Microsoft Programs

Let’s be honest: software is what keeps the modern business world turning. We all rely on programs like Microsoft Word to draft documents, Excel to crunch numbers, and Outlook to stay connected. But faced with tight budgets, it can be tempting to cut corners by using unlicensed copies. It might seem like a harmless way to save a few dollars upfront, but that initial saving is an illusion. The reality is that using unlicensed software is a huge gamble, one that can seriously threaten your company’s security, finances, and good name. That’s why ensuring your Microsoft software is properly licensed isn’t just a best practice; it’s an absolute necessity for protecting your business.

The cybersecurity nightmare

Using unlicensed software is like leaving your front door unlocked in a busy neighborhood. Microsoft is continually working to seal security holes that hackers love to exploit, issuing regular updates to keep everyone protected. But if your software isn’t legit, you’re left out of the loop. Your computer and your entire network become a target for malware, ransomware, and data breaches. Think about it: the cost of dealing with just one attack, from lost data and operational chaos to regulatory fines and shattered customer trust, could be astronomical. That “bargain” software suddenly becomes the most expensive mistake you’ve ever made.

Performance and stability issues

Beyond security, unlicensed software is often unstable. The code has usually been tampered with to bypass payment, which means it’s no longer the original product Microsoft built and tested. That tampering leads to glitches, random crashes, corrupted files, and endless frustration. Imagine trying to build a house on a cracked foundation. It’s unreliable from the start. Businesses that rely on pirated versions often end up wasting more time and money fixing issues than they would have spent on proper licenses. By using licensed different versions of Windows Server 2025, you ensure smooth, reliable performance that helps your business reach its goals without setbacks. This gives you peace of mind and makes your business more powerful and competitive.

Legal consequences

Unlicensed software use is not a gray area. It is unlawful and constitutes piracy. Software Asset Management audits are a proactive way for Microsoft and other providers to verify compliance. If your company is discovered, you may be subject to severe penalties, which may include paying the full retail price of each unlicensed copy in addition to other damages. In addition, legal fees and administrative hassles can deplete resources and divert attention from managing your company. The consequences of an audit can sometimes destroy a business.

 

No support or backup

Buying a legitimate license doesn’t just give you the software; it gives you access to Microsoft’s support and resources. That means if something breaks, you’re not left guessing. You have experts, documentation, and solutions at your fingertips. With unlicensed software, however, you’re on your own. You won’t have a help desk to call or reliable instructions to follow. Instead, you’ll waste valuable time digging through questionable forums, hoping someone else has the same problem and the right fix.

Why licensing is worth it

Licensed Microsoft software is more than a box to check for compliance. It’s an investment in your company’s security, reliability, and long-term success. The risks tied to unlicensed programs, including financial losses, legal disputes, and damaged reputation, far outweigh the cost of doing things the right way. With proper licensing, you gain peace of mind knowing your systems are safe, stable, and fully supported, allowing you to focus on growing your business instead of fighting preventable problems.

 

Electric vehicle charging points vulnerable to cyber attack

Belfast based cyber security specialist ANGOKA says developers of the UK’s fast-growing network of electric vehicle charging points could be sleep-walking into a high-risk vulnerability to hacking and cyber-attacks.  

Significant and rapid growth in the number of electric vehicle charging points is expected in the next three years. There are estimated to be more than 100,000 petrol and diesel pumps across the UK while the number of EV charging points( home and Public) stands at over 350,000 and counting.  While the growth in public charging points will grow exponentially, the risk of hacking, disabling and even weaponizing these has become an increasingly recognized problem. 

Richard Barrington, ANGOKA’s head of land mobility says the race to decarbonize and the shift to electrification goes hand in hand with digitization.  

“We need to electrify our economy but we have not fully understood the need for cyber security in this transition,” says Mr Barrington.  

“While data protection through encryption is in place to prevent the theft of financial information through credit cards and electronic payment forms, the cyber security of the actual charging points should be at the top of the agenda,” he says. 

Because EV charging points are all networked, the risk goes beyond theft of financial information or abstracting electricity. ANGOKA says the potential to engineer an attack back onto the national grid or spoof charging indicators allowing batteries to be over or undercharged means the industry must adopt the Zero Trust principles of Never Trust, Always Verify! 

“The threat landscape becomes even more extensive when you consider the bi-directional data exchange between vehicle and charging point,” says Mr Barrington, “this data exchange can be unprotected and vulnerable meaning hijacking, the introduction of malware and denial of service attacks become probable. 

ANGOKA says the responsibility of providing the cyber security to protect these from attack has fallen between the players in the supply chain, Manufacturers, Installers, operators and procurers e.g. local authorities. 

New regulations coming into force next year creates a more open market in that anyone should be able to use any charging point  irrespective of the operator.  Unfortunately greater levels of interconnectivity will lead to a widening of the threat landscape and risk potentially at national scale.  Mr Barrington. “We believe there is an approach that can address these concerns and the  EV charging sector and the motor industry must step up and take action.” 

Representatives from the automotive sectors are due to meet ANGOKA representatives in Belfast in the coming weeks in anticipation of new EV charging point regulations to be introduced next summer.  

Survey Finds One in Five Firms in Ireland Experienced a Cyber Attack Last Year

Aon plc, a leading global professional services firm, today released figures that reveal that most senior business leaders in Ireland plan to increase investment in cyber security and resilience in the coming years amid the evolving cyber risks facing Irish firms.  

The survey of 228 senior business leaders from companies across Ireland reveals that 18 percent of Irish firms experienced a cyber-attack or data breach in 2022. Large companies with more than 250 employees are more at risk, with 21 percent of firms facing an attack last year compared to 9 percent of SMEs.

Companies have taken steps in the past year to strengthen their cyber resilience and preparedness, with 38 percent having enhanced their data recovery and back-up systems and 35 percent having provided cyber security training to employees. This represents a slight decrease from levels seen in 2021, when 40 percent of employees were provided with cyber security training.  

Given the ever-changing cyber landscape, over two thirds of Irish firms (67 percent) plan to invest more in cyber security and resilience in the coming years. Seventy-two percent of firms with more than 250 employees are due to increase their spending on cyber security measures.

The survey also points to the growing dominance of cyber threats on an organisation’s risk register. According to the findings, cyber is now the fourth biggest business risk facing Irish organisations today.

Karl Curran, Head of Aon’s Cyber Solutions Ireland and Nordics, said: “Our figures show that cyber resilience is very much front and centre of Irish business leaders’ concerns. As the fourth biggest risk facing Irish organisations today, and with one in five firms being disrupted by a cyber-attack last year, business leaders are acutely aware of the enormity of the risk that cyber-attacks present and the need to plan accordingly. However, far too often, successfully managing cyber risk only becomes a priority after a cyber incident has occurred. Despite the majority of Irish firms planning to invest more in cyber security and resilience in the coming years, more than a quarter of Irish business leaders don’t have any plans to invest more in cyber security and resilience in the near future.

“Amidst an increasingly complex business environment, business and IT leaders are under increasing pressure to make smart security investments. And the truth is there is no one straight line approach to cyber security. It is a continuous journey focused on building resilience.

“At Aon Ireland, we encourage leaders to review their cyber security posture and take a strategic approach to managing cyber risk that is informed by data. This begins by assessing the cyber risk landscape, identifying the ways in which your IT team can mitigate challenges, transferring risk out of the business and, when faced with a crisis, recovering with speed. By taking a data-driven, circular approach to cyber resilience, business and IT leaders can come together to make better decisions that protect the future of their organisation and its people.”

To help business leaders on this journey, Aon’s Cyber Loop is a model for sustained cyber resilience that recognises the growing concern around cyber threats and supports businesses on their journey of investment. Comprising four main stages – assess, mitigate, transfer and recover – the Cyber Loop supports business leaders to maximise return on cyber security investment and become an informed participant in managing risk.

The four main stages of Aon’s Cyber Loop are:

  1. Assess

A thorough assessment of an organisation’s cyber risks will ensure that they are better informed and in a better position to agree on an appropriate risk strategy.

  1. Mitigate

Bridge the gap between understanding the technical risk of an identified vulnerability and the related financial exposure to inform decisions that can enhance security maturity and maximise return on security investment.

  1. Transfer

Despite a rising tide in cyber governance, losses still emanate from human error, system failure or security failure. Aon’s experts help businesses to identify, quantify and transfer cyber risk into the insurance market.

  1. Recover

Aon’s team of experts are experienced in maximising possible recovery of costs and working towards a cashflow neutral position.

To learn more about Aon’s Cyber Loop, visit https://www.aon.com/cyber-solutions/thinking/the-cyber-loop-a-model-for-sustained-cyber-resilience/.

Types of DDoS Attacks in blockchain and What is it?

There are many myths associated with blockchain technology but the biggest one is that it is completely invulnerable to DDoS attacks. But this is not the case, blockchain is quite vulnerable to DDoS attacks. Along with this, let us also try to know what a DDoS attack is in the blockchain. A distributed denial of service DDoS attack on a blockchain occurs only when the blockchain’s clients are unable to send new transactions and add them to newly generated blocks. This is an attack that targets more than one layer of the blockchain. If you are planning to trade Bitcoin, you must choose the best platform such as BitQZ app.

In this blog, we will discuss what is the main reason why DDoS attacks happen on blockchain and how and why they are happening. Next, we’ll explore some types of blockchain DDoS attacks as well as design cow issues, here are the exploits for each attack. Moreover, we will also provide real examples of all those attacks, so if you are also interested in that, you will have to keep reading this blog.

What is DDoS Attack in Blockchain?

DDoS (Distributed denial of service) attacks in blockchain are only observed when the transactions sent by the clients connected to the blockchain are unable to connect to them. One of the biggest myths that remain in the blockchain is that it is immune to DDoS (Distributed Deny of Service) attacks. This is a myth that has been brought from the blockchain design and can only confuse you. Blockchain technology is based on only one fact and that is that it is connected to many powerful computer networks and can only do one thing at a time. This architecture only defends blockchain networks against conventional DDoS (Distributed Deny of Service), which aims to overwhelm a server’s network traffic and prohibit it from servicing other clients. Furthermore, DDoS (Distributed Denial of Service) attacks can impact many OSI model levels even in conventional networks.

Types of DDoS attacks on Blockchain

The new whole layer of the blockchain network is targeted by DDoS attacks. But some of those attacks are such that they can be launched even without technical skills. Here you will learn about the types of blockchain DDoS attacks:

Protocol-based Blockchain DDoS Attack

This protocol-based attack is observed only when the transaction mempool is saturated with another (fake transaction) transaction. The transaction mempool, which is a type of transaction that has this limited memory and is already verified, may have to wait to be included in the block. The size of the block can be included with the blockchain after the interval, if the transaction is not included in the block its memory zone is temporarily stored with the next block. A large number of fake transactions are sent to the blockchain by the attacker to exploit the behaviour and at the same time attempt to make its network unavailable.

DApp-Based Blockchain DDoS attack

This decentralized app-based DDoS attack is only visible when it consumes gas to complete smart contract execution running with the blockchain. All smart contracts that run with the blockchain require a finite amount of gas that is used to run properly. For a smart contract to properly complete its activities, an individual must also set a predetermined gas limit while attempting to run one. The transaction is reversed but the gas also isn’t refunded if the user-specified gas is used up prior to the smart contract and correctly completes its execution. There are some cases where some behaviour is presented regardless of the gas limit by users, which is one of the main reasons that lead to DoS attacks. This kind of attack may be caused by a smart contract issue and may be started purposefully by either an attacker or unintentionally following a user action.