Building Cyber Resilience in the AI era: Five ways Irish organisations can stay ahead

Artificial intelligence (AI) is rapidly reshaping the cybersecurity landscape across Ireland. While it’s unlocking new efficiencies and accelerating innovation, it’s also giving cybercriminals new evasive tools to launch faster and more sophisticated attacks. Across Ireland, organisations are navigating a new era of cyber risk defined by speed, sophistication, and AI.

As Dell Technologies continues to work closely with Irish businesses to modernise their digital infrastructure, it’s clear that cybersecurity must evolve in tandem, as a strategic enabler of trust and resilience. Threat actors are using AI to enhance ransomware, zero-day vulnerabilities, Distributed Denial of Service (DDoS) all making advanced spear-phishing much harder to identify, outpacing conventional security measuresAccording to the latest Dell Technologies Innovation Catalyst Study, 84% of Irish organisations view security as a key part of their business strategy, yet many continue to struggle with balancing innovation and security.

Almost all respondents (96%) admitted that integrating security into wider business strategies is proving difficult. These figures highlight that organisations must rethink their cybersecurity strategies to adopt proactive, intelligent, and resilient approaches that keep pace with the evolving threat environment.

Here are five ways to stay resilient against cyber threats:

1.Adopt zero trust for AI Security 

As threat actors use AI to scout, steal credentials and adapt attack techniques, traditional perimeter-based defenses fall short.

That’s why more Irish organisations are adopting a Zero Trust model built on the principle of “never trust, always verify” ensuring that every user, device, and application is continuously authenticated, regardless of location.

The benefits are clear, latest Innovation Catalyst Study revealed a 100% increase in confidence levels among Irish organisations that have adopted zero trust principles, underscoring its growing value as a security framework. By implementing zero trust principles organisations can help reduce risk by continuously verifying every access request and implementing strict authentication processes. Using role-based access controls (RBAC) and network segmentation, organisations can minimize the risk of an attack and reduce the impact radius if an attack occurs.

Zero trust is more than a security philosophy. It’s a unified and adaptive strategy for identity and access management. Through a zero trust approach, organisations not only reduce their attack surface, but also strengthen their ability to detect, respond to and contain threats.

2.Reduce the attack surface

In an environment where AI-powered threat actors are constantly probing for weaknesses, reducing the attack surface is a critical line of defense. Every exposed endpoint, unsecured API, or overlooked supply chain vulnerability represents an opportunity for adversaries to infiltrate systems, deploy malware and exfiltrate sensitive data.

To mitigate these risks, Irish organisations should begin with assessing and understanding their attack surface and related vulnerabilities. From there, they should have a layered defense strategy focused on securing entry points and minimising exposure. This includes strengthening authentication, encrypting data, regularly testing for vulnerabilities and actively monitoring endpoints. Keeping systems patched and devices hardened further limits risks.

By reducing the attack surface, organisations make themselves a harder target, thereby decreasing the likelihood of an attack.

3.Continuously detect and respond to threats

AI-powered attacks are capable of mimicking legitimate behavior and evading traditional security tools, and organisations need to combine advanced threat detection with rapid response capabilities.

Leveraging AI and machine learning, organisations can monitor operational data, detect anomalies, and trigger automated responses in real time.

This AI-powered threat intelligence system builds upon itself, making it smarter and better able to identify and address attacks.

For many Irish organisations who need assistance scaling threat detection and response. Partnering with a trusted third-party provider offers round-the-clock monitoring, faster reaction times, and support in managing complex security operations. Dell Technologies continues to invest in AI-driven security solutions that help Irish organisations stay ahead of emerging threats while simplifying operational complexity.

4.Plan an incident response and recovery plan

While prevention is often the first step to a cybersecurity strategy. A strong cybersecurity strategy includes not only prevention, but also a well-defined plan for response and recovery.

Organisations here in Ireland need to create and routinely practice a robust Incident Response and Recovery (IRR) plan that outlines how to detect, contain, communicate and recover from cyber incidents. The plan should outline departmental roles and responsibilities, internal and external contacts and partners, communication protocols and include regular testing. Preapproved messaging templates and routine plan updates are also essential to maintaining operational continuity during a crisis.

Backing up critical data and applications offline or separated from production workloads helps guard it against ransomware attacks and ensures business continuity.

By preparing for disruption, Irish organisations can restore critical functions with resilience, speed, and confidence.

5.Empower employees as a first line of defense

Technology alone isn’t enough; employees remain the most critical line of defense.  Organisations here in Ireland needs to create a culture of vigilance through employee awareness programmes that integrates continuous education, open communication, real-world simulations, and a culture of shared accountability. For example, incorporating attack simulations that reflect AI-specific threats like advanced phishing and deepfakes helps equip employees to recognise and respond to evolving threat actor tactics.

Collaboration across the technology ecosystem also plays a vital role in strengthening cyber resilience. Dell Technologies, together with partners like NVIDIA, is helping organisations better understand how AI-driven attacks evolve.

NVIDIA’s new AI Kill Chain Framework reimagines the traditional Cyber Kill Chain for the AI era, outlining how adversaries target AI systems through stages such as Recon, Poison, Hijack, Persist, and Impact — often cycling through these stages to adapt and escalate their tactics. This framework offers valuable insights into how attackers’ probe, manipulate, and maintain access within AI ecosystems, helping defenders anticipate and disrupt evolving threats before they lead to broader compromise.

As threat actors evolve using AI to launch increasingly sophisticated attacks, organisations must respond with equal force and foresight. Traditional defenses alone are insufficient. A modern cybersecurity strategy demands a proactive, layered approach that integrates advanced technologies, incident response planning, and a vigilant workforce.

As we mark Cybersecurity Awareness Month, it’s an important reminder that AI is transforming both the opportunities and the risks facing Irish businesses, making it more critical than ever to invest in continuous vigilance, awareness, and adaptation. By embedding resilience at every level of their cybersecurity strategy, Irish organisations can better safeguard their operations and lead with confidence in an increasingly AI-driven world.

Types of DDoS Attacks in blockchain and What is it?

There are many myths associated with blockchain technology but the biggest one is that it is completely invulnerable to DDoS attacks. But this is not the case, blockchain is quite vulnerable to DDoS attacks. Along with this, let us also try to know what a DDoS attack is in the blockchain. A distributed denial of service DDoS attack on a blockchain occurs only when the blockchain’s clients are unable to send new transactions and add them to newly generated blocks. This is an attack that targets more than one layer of the blockchain. If you are planning to trade Bitcoin, you must choose the best platform such as BitQZ app.

In this blog, we will discuss what is the main reason why DDoS attacks happen on blockchain and how and why they are happening. Next, we’ll explore some types of blockchain DDoS attacks as well as design cow issues, here are the exploits for each attack. Moreover, we will also provide real examples of all those attacks, so if you are also interested in that, you will have to keep reading this blog.

What is DDoS Attack in Blockchain?

DDoS (Distributed denial of service) attacks in blockchain are only observed when the transactions sent by the clients connected to the blockchain are unable to connect to them. One of the biggest myths that remain in the blockchain is that it is immune to DDoS (Distributed Deny of Service) attacks. This is a myth that has been brought from the blockchain design and can only confuse you. Blockchain technology is based on only one fact and that is that it is connected to many powerful computer networks and can only do one thing at a time. This architecture only defends blockchain networks against conventional DDoS (Distributed Deny of Service), which aims to overwhelm a server’s network traffic and prohibit it from servicing other clients. Furthermore, DDoS (Distributed Denial of Service) attacks can impact many OSI model levels even in conventional networks.

Types of DDoS attacks on Blockchain

The new whole layer of the blockchain network is targeted by DDoS attacks. But some of those attacks are such that they can be launched even without technical skills. Here you will learn about the types of blockchain DDoS attacks:

Protocol-based Blockchain DDoS Attack

This protocol-based attack is observed only when the transaction mempool is saturated with another (fake transaction) transaction. The transaction mempool, which is a type of transaction that has this limited memory and is already verified, may have to wait to be included in the block. The size of the block can be included with the blockchain after the interval, if the transaction is not included in the block its memory zone is temporarily stored with the next block. A large number of fake transactions are sent to the blockchain by the attacker to exploit the behaviour and at the same time attempt to make its network unavailable.

DApp-Based Blockchain DDoS attack

This decentralized app-based DDoS attack is only visible when it consumes gas to complete smart contract execution running with the blockchain. All smart contracts that run with the blockchain require a finite amount of gas that is used to run properly. For a smart contract to properly complete its activities, an individual must also set a predetermined gas limit while attempting to run one. The transaction is reversed but the gas also isn’t refunded if the user-specified gas is used up prior to the smart contract and correctly completes its execution. There are some cases where some behaviour is presented regardless of the gas limit by users, which is one of the main reasons that lead to DoS attacks. This kind of attack may be caused by a smart contract issue and may be started purposefully by either an attacker or unintentionally following a user action.

Nokia turns network information into actionable security insights for Exponential-e. #Nokia #Deepfield

Nokia today announced an extension of its partnership with Exponential-e, a UK-based specialized cloud and unified communications service provider. Exponential-e will use the Nokia Deepfield solution to improve user experience and increase visibility into applications and service traffic on its network. The solution will also support Exponential-e to combat next-generation distributed denial of service (DDoS) attacks.

Exponential-e will rely on Nokia Deepfield software for real-time, actionable insights into network performance and quality of experience. Nokia Deepfield provides Exponential-e with full, end-to-end visibility into internet-based content, applications and services that flow into and across its network.

According to IDC’s Worldwide DDoS Prevention Products and Services Forecast, 2020–2023, DDoS attacks remain popular among cybercriminals as a tool for attacking and taking down network infrastructure and services. As future network attacks will utilize new technologies and approaches, businesses must prepare to protect and defend their networks against more sophisticated attacks. Exponential-e has deployed Nokia Deepfield Defender to detect and identify malicious traffic at scale and to minimize false positives.

Nokia Deepfield enables effective DDoS mitigation through API integration with third-party scrubbing centers – centralized data cleansing stations where network traffic is analyzed, and malicious traffic is removed. The Nokia Deepfield solution uses multidimensional, real-time network and service insights to improve performance, enhance security and optimize the customer experience.

Mukesh Bavisi, Managing Director at Exponential-e, said: “Exponential-e is a leading service provider within the UK, recognized for our innovative technology solutions. Nokia Deepfield gives us the necessary network visibility and actionable analytics that will allow us to continue to improve our network and service capabilities while providing our customers with assured quality, enhanced security and a reliable network environment.”

Cormac Whelan, CEO of UK and Ireland at Nokia, said:

“Nokia has been a long-time strategic partner of Exponential-e, dating back to their origin in the early 2000s and throughout the years as they have grown to become a leader in national-scale Ethernet and IP/MPLS-based network service delivery. As Exponential-e now embarks on the next phase of development, we are proud to be working with them to drive improved network performance and security through actionable insights provided by the Nokia Deepfield platform.”

For more information