Press Release
CNT uses blockchain technology to help “carbon neutralization”
At a critical moment when environmental problems are increasingly affecting human survival, the world recognizes that achieving “carbon neutralization” is a necessary stage to slow down global warming. Statistics show that more than 120 countries and two-thirds of the economies have joined the great transformation of “carbon neutrality”.

At present, carbon emission trading is considered as an effective tool to deal with climate change with the market mechanism. Through the carbon dioxide emission quota of the main greenhouse gas, government departments can control the total amount of carbon emission quota, so that the emission control enterprises incorporated into the market are limited by the carbon emission quota, and then through the introduction of the trading mechanism, the optimal allocation of resources can be achieved. Therefore, many countries have initiated the eco chain alliance to focus on the application of blockchain in key application scenarios such as carbon trading ecological network. It can be said that blockchain technology has great application value in helping to achieve the goal of carbon neutralization in the future.
CNT foundation is establishing carbon trading agreement, a public blockchain system focusing on carbon neutrality and carbon emissions trading. CNT Foundation believes that blockchain technology can better solve the basic contradictions in the carbon emission market. Similarly, carbon emission trading and carbon offset can alleviate the negative problems brought to the external environment by the blockchain POW consensus mechanism.
Through blockchain technology, CNT can establish a traceability application covering the whole supply chain and fully evaluate the carbon footprint of suppliers, so as to judge whether it can be incorporated into its own supply chain system. Enterprises in the supply chain can also collect and analyze their carbon emission performance through traceability data to reduce carbon emission, improve energy efficiency and optimize business to achieve carbon neutralization.

The application of blockchain traceability can also improve the transparency of industrial chain and supply chain. With transparent and reliable data, enterprises can make effective carbon disclosure and formulate corresponding carbon compensation schemes, so as to realize the real carbon neutral supply chain and negative carbon supply chain.
Using blockchain and privacy computing technology, information can be verified but invisible. Through the private key signature authorization of the data owner, the data access right can be temporarily opened to specific potential partners, upstream and downstream enterprises and third-party regulators to verify carbon emission related data. All quantifiable carbon emission data can be shared safely in this way.

Once the concerns about enterprise data security are eliminated, carbon emission data can be circulated and shared at the industrial level, and the value of data can be truly unlocked. This will advance the process of achieving the goal of carbon neutrality.
If we want to reduce greenhouse emissions to avoid two degrees of temperature rise and even worse climate change, we need to make fundamental technological innovation. Although emission trading markets are potential solutions, they must be improved in order to achieve a certain degree of meaningful emission reduction in market efficiency and scale. Although blockchain technology can theoretically improve these markets, suitable networks that can promote this market transformation have not been developed. In addition, the blockchain network (the most popular blockchain in the past) does not have a design to reduce the impact on the environment. Therefore, in the spirit of decentralization and sustainability, carbon trading agreement has developed into a blockchain carbon sink trading network with carbon neutralization as the core.
By enabling the carbon trading agreement, the customers on the network will contribute to their carbon neutralization through their transaction fees. The transaction fees are concentrated to purchase real and verifiable carbon sink assets, and then offset the carbon trace of the carbon trading agreement, so as to ensure their de neutralization, carbon trading, carbon neutralization and carbon asset storage. The process is transparent and supervised by various stakeholders in community governance, including CNT holders, verifier nodes and elected committee members, who are encouraged to maintain the security and reliability of the network.

Realizing “carbon neutralization” is one of the major trends in the future. As a new generation of subversive core technology after steam engine, power and Internet, blockchain’s unique personality will play a key role in the carbon trading market. Through the application of blockchain technology, the scale of the global carbon trading market may exceed trillion dollars in the near future. It can be said that there is still a lot of room for development.
About Author
Disclaimer: The views, suggestions, and opinions expressed here are the sole responsibility of the experts. No Digi Observer journalist was involved in the writing and production of this article.
Press Release
GISEC Global 2025 Launches OT Security Conference as Cyberattacks on Critical Infrastructure Surge 49%
New dedicated track at Middle East and Africa’s largest cybersecurity event tackles AI-driven industrial threats, Zero Trust adoption and the $44.9B OT security boom
Dubai, UAE, 11th May 2025, ZEX PR WIRE, As operational technology (OT) cyberattacks skyrocketed 49% in 2024 – targeting power grids, oil & gas facilities, factories and transport systems – GISEC Global 2025 is responding with the launch of its pivotal new OT Security track at the Middle East and Africa’s largest cybersecurity event, currently taking place until 8th May at the Dubai World Trade Centre.
The OT-focused conference on the second day of GISEC Global tackled evolving risks, system vulnerabilities and strategies for securing critical infrastructure. Other important considerations included AI in ICS/OT Security, Quantum Computing Threat, Protecting ICS and SCADA Systems & Digital Supply Chains in the presence of top CISOs, CIOs, OT security heads and policy-makers to fortify SCADA, ICS and digital supply chains.
The new addition arrives amid a perfect storm in the industry:
- The global OT security market is projected to double to $44.9 billion by 2029 (Markets and Markets).
- According to research by IBM, the average cost of cyberattacks on organisations in the Middle East is $8.75 million, nearly double the global average.
Why OT Security? Why Now?
OT security encompasses advanced cybersecurity protocols designed to ensure the integrity, availability and safety of industrial control systems. As critical infrastructure faces escalating cyber threats, robust OT security is essential for maintaining continuity across the oil & gas, manufacturing, energy, transport and utility sectors.
In late 2024, ransomware groups accelerated attacks on industrial sectors, with manufacturing, transportation and ICS operations prime targets. Only aggressive defence, intelligence sharing and cross-sector collaboration will safeguard critical infrastructure into 2025 and beyond.
On Wednesday, the audience heard from experts on the need for modern OT protection which delved into precision AI, leveraging machine learning, deep learning and large language models.
Discussing cybersecurity threats in the maritime industry, where ships can hold up to 10,000 passengers, are driven autonomously and each country has their own set of AI regulations, Simone Fortin, Global CISO Cruise Division at MSC Cruise Division, called for streamlined regulations that can be applied to all countries around the world.
He said: “For an industry like maritime, which is regulated by the UN, it is hard to interpret how to prevent AI threats for something critical like managing a ship. The UN gives the policy a broader scale, but then everything is regulated by bilateral agreements between the states and the regulators, and implemented by companies; but then, everything is defined by the fact that you could be in international waters. And ships can be owned by one entity, managed by another while sailing under a separate flag.”
Bridging the gap between AI-powered cyber defence and critical infrastructure resilience, the OT Security Track also put the spotlight the escalating IoT/IIoT threats in the oil & gas sector, featuring frontline insights from global CISOs defending the world’s most targeted industries.
Amal Krishna, Executive Director & CISO, ONGC, said: “To combat the surge in OT cyberattacks, businesses must prioritise asset visibility, network segmentation and secure remote access – but equally critical is breaking down silos between IT, OT and engineering teams. Cyber resilience in critical infrastructure isn’t just about technology, it’s about collaboration, continuous monitoring and a security-first culture.”
Albert Vartic, Upstream OT Cybersecurity Officer, OMV Petrom, added: “Over the next five years, OT cybersecurity in the Middle East’s critical infrastructure will see significant evolution. The region’s rapid digitalisation has expanded the attack surface, making industrial systems more vulnerable – proactive measures like IEC 62443 adoption and cross-team collaboration will be essential to safeguard operational resilience.”
Protect and plan against digital attacks
Exhibitors Ayman Al Issa (CPX) and Mohammed Mousa (CyberKnight) dissected the 49% surge in OT attacks, offering actionable defences for the energy, healthcare and manufacturing sectors.
Mousa, OT/xIoT Consultant at CyberKnight, warns that legacy OT systems weren’t built for today’s threats.
He explained: “The escalation in intrusions is a consequence of accelerated digital transformation in industrial sectors. As organisations integrate IT and OT environments to improve efficiency and support the business, they inadvertently expand the threat surface. Furthermore, legacy systems remain in operation far beyond their intended lifespan and often lack native security controls.
“Meanwhile, increased reliance on remote access, third-party integrations, and limited OT-specific cybersecurity governance heightens exposure. Simply put, organisations are moving faster than their security strategies are evolving.”
For businesses and governments to stay ahead of cyber criminals, Al Issa, Director – OT Cybersecurity at CPX, emphasised the importance of undertaking risk and threat assessments to understand what assets are at risk and how potential attackers might target them, sooner rather than later.
He said: “In today’s fast-shifting business landscape, organisations need to focus on identifying their most critical assets – those that are at the highest risk and that they care about the most, rather than trying to protect everything or plan for recovery across the entire business. As such, organisations should conduct in-depth threat and risk assessments specifically considering the unique characteristics of industrial control systems (ICS), including their physical consequences.
“This involves mapping out interdependence, potential attack vectors and consequences of downtime. Using threat intelligence and aligning with frameworks like CIS ICS Controls can help organisations monitor suspicious activity, manage vulnerabilities and create tailored incident response plans.
“Once this is clear, more targeted and practical defence measures can be put in place and continuously tested, using threat intelligence to stay ahead of evolving threats. Risk assessments should be continuous, evolving with technological changes and emerging threats and should be validated through regular penetration testing.”
Amr Elsayed, Regional OT/ICS Cybersecurity Specialist at CyberKnight, agrees, saying technology, collaboration and workforce training should be key priorities for businesses.
He said: “To enhance OT security resilience against rising cyber threats, businesses should adopt a Zero Trust approach, enforcing least-privilege access and micro-segmentation to limit breach impact. Advanced real-time monitoring and threat intelligence sharing (ISACs, public-private partnerships) are critical for proactive defences.
“Additionally, maintaining accurate OT asset inventories, conducting OT-specific incident response drills and implementing risk-based vulnerability management (compensating controls, tailored patching) will strengthen security postures. Finally, OT-focused employee training ensures a security-aware workforce.
“By prioritising these measures – spanning technology, collaboration and workforce readiness – organisations can safeguard critical infrastructure, mitigate disruptions and build long-term cyber resilience in OT environments.”
Drafting the legislation playbook
With Middle East nations rapidly adopting digitisation into their day-to-day practices, the region is becoming a target for cyberattacks. However, the experts expect a number of measures to be put in place to protect cybersecurity infrastructure, and GISEC 2025 could be where policymakers and tech giants will draft the playbook.
Al Issa added: “Over the next five years, we can expect a major shift toward structured, regulation-driven cybersecurity approaches. AI-driven OT threat detection, the widespread adoption of Zero Trust principles and deeper integration of compliance frameworks will define the regional OT cybersecurity landscape. Stricter regulatory frameworks and compliance mandates region-wide will push for better security practices.
Organised by Dubai World Trade Centre, GISEC Global 2025 is hosted by the UAE Cybersecurity Council under the theme of ‘Securing an AI-Powered Future’, and supported by Dubai Electronic Security Center (DESC), UAE Ministry of Interior and Dubai Police.
To learn more about GISEC Global 2025, visit www.gisec.ae.
About GISEC Global
GISEC Global, Middle East & Africa’s largest and most impactful cybersecurity event, will return to Dubai World Trade Centre for its 14th edition taking place from 6th to 8th May 2025, under the overarching theme of “Securing an AI-Powered Future.” Following the monumental success of 2024, the super-connector event for the region’s cybersecurity industry will bring together over 25,000 attendees, 750 exhibiting brands and 350-plus speakers hailing from over 160 countries. GISEC Global stands as the unrivalled platform for navigating the ever-evolving landscape of cybersecurity. More information: www.gisec.ae
About Dubai World Trade Centre
A global business facilitator since 1979, Dubai World Trade Centre (DWTC) is home to the region’s leading purpose-built convention and exhibition centre. DWTC provides a platform for connecting people, products, innovation and ideas from around the world through a dynamic calendar of international trade exhibitions and its own roster of sector leading mega events. As a designated free zone, complemented by award-winning commercial real estate, DWTC plays an integral role in Dubai and the region’s growth story. Since its inauguration, DWTC has hosted over 6,000 events, with an estimated economic output of AED 248 billion, attracting over 38 million business visitors to Dubai.
Building on this legacy, DWTC’s second flagship venue, the Dubai Exhibition Centre (DEC), stands as a premier destination for prominent national and international mega events. Strategically aligned with the Dubai 2040 Urban Master Plan, DEC’s recently announced AED 10 billion expansion is integral to Expo City Dubai’s vision of becoming a global business hub for exhibitions and events.
Press information and photographic material: click here
Media Contact:
Jane Oneill – PR Manager
Ahmad Khalloudi – PR Manager
Follow GISEC Global on social media: Facebook | X | Instagram | LinkedIn | Youtube
Hashtag: #GISECGlobal
About Author
Disclaimer: The views, suggestions, and opinions expressed here are the sole responsibility of the experts. No Digi Observer journalist was involved in the writing and production of this article.
Press Release
The First-Ever School of Cyber Defense (CTF) Competition Successfully Concluded at GISEC GLOBAL 2025
Dubai, UAE, 11th May 2025, ZEX PR WIRE, The highly anticipated School of Cyber Defense (CTF) competition, held as part of GISEC GLOBAL 2025, concluded with exceptional participation and fierce competition. On May 8, the Dubai World Trade Centre hosted the largest cybersecurity event in the Middle East, attracting participants across the UAE.
The Dubai Electronic Security Center (DESC), organized by TechFirm, launched this groundbreaking competition for the first time ever, drawing significant attention from the top universities in the UAE. Over 300 applications were submitted, with 130 participants selected to compete in the qualification rounds on May 6–8.
After the intense challenges, the top 50 scorers advanced to the final stage on May 8, where they formed 10 Incident Response Teams. These teams tackled high-pressure cybersecurity scenarios in real time, demonstrating not only their technical mastery but also their ability to collaborate, analyze rapidly, and adapt under pressure. The competition simulated real-world challenges such as network defense, threat management, system security, and incident response, with participants’ actions evaluated through an advanced scoring platform.
The Winners of the School of Cyber Defense (CTF) Competition:
- 1st Place: ScriptKiddies (Al Ain University)
- 2nd Place: Rage Quitters (University of Dubai)
- 3rd Place: Hungry Sharks (Abu Dhabi University)
The event, with a prize pool valued at over AED 130,000, has further solidified the importance of nurturing the next generation of cybersecurity experts. The competition’s success was driven by the support of leading industry partners, including Spire Solutions, Huawei, HPE Networking, HONOR, Circularo, Great List and RAS Infotech, all of whom are committed to empowering young talents and advancing cybersecurity expertise. All competition infrastructure was powered by servers based on AMD EPYC processors, providing participants with industry-leading performance and advanced security features.
This competition is a key milestone in building a resilient digital future and highlights the increasing role of cybersecurity in shaping tomorrow’s technology landscape.
For more information, please contact:
+971522707567
gctf2025@techfirm.ae
https://techfirm.ae/ctf/
About Author
Disclaimer: The views, suggestions, and opinions expressed here are the sole responsibility of the experts. No Digi Observer journalist was involved in the writing and production of this article.
Press Release
Sage Quantum Downgrade: Why It may be the right move
Brandon, MB, 11th May 2025, ZEX PR WIRE, Sage 50 Quantum is a robust accounting solution tailored for larger businesses with intricate financial needs. However, for some organizations, downgrading to a simpler version like Sage 50 Premium or Pro can offer significant advantages.
Sage 50 Quantum comes with a higher price tag due to its advanced features and multi-user capabilities. For businesses that don’t fully utilize these capabilities, downgrading to a lower-tier Sage version can save significant costs without sacrificing essential accounting functions
The advanced features of Sage Quantum can make the software more difficult to navigate. By downgrading to a simpler solution, businesses benefit from an easier user experience. Programs like Sage 50 Premium or Pro offer a more intuitive interface, which can save time and reduce errors in everyday tasks like invoicing and reporting.
If your business no longer requires as many users or has simplified its operations, the multi-user capacity of Sage Quantum might be unnecessary. Downgrading to a smaller version or another software that supports fewer users will better align with your current needs and reduce costs associated with maintaining extra licenses.
Sage Quantum’s robust features can also make the software more difficult to navigate. By downgrading to a simpler solution, businesses benefit from an easier user experience. Programs like Sage 50 Premium or Pro offer a more intuitive interface, which can save time and reduce errors in everyday tasks like invoicing and reporting.
While Sage Quantum offers strong on-premise capabilities, businesses looking for better cloud integration and mobile access may find that downgrading to a simpler version or switching to cloud-based software like QuickBooks Online offers greater flexibility and access to real-time data.
Downgrading from Sage Quantum can lead to cost savings, a more user-friendly experience, and better alignment with current business needs, especially for smaller or scaling-down businesses. However, it’s essential to assess your specific requirements before making the transition
Visit https://e-tech.ca/Sage-50-Quantum-Downgrade-Service.aspx for more information.
About E-Tech
Founded in 2001, E-Tech is the leading file repair, data recovery, and data conversion services provider in the United States and Canada. The company works to stay up to date on the latest technology news, reviews, and more for their customers.
For media inquiries regarding E-Tech, individuals are encouraged to contact Media Relations Director, Melanie Ann via email at Melanie@e-tech.ca.
To learn more about the company, visit: www.e-tech.ca
About Author
Disclaimer: The views, suggestions, and opinions expressed here are the sole responsibility of the experts. No Digi Observer journalist was involved in the writing and production of this article.
-
Press Release5 days ago
Rocky Mountains Asset Management Ltd. Launches Global Academic Partnership Program to Build Future AI-Driven Financial Talent Base
-
Press Release4 days ago
Plan D Media: Kolkata’s Premier Lead Generation Agency for Healthcare, Education, and Manufacturing
-
Press Release1 day ago
Dallas Residents Gain Access to Bespoke Healthcare Coverage as Wilkerson Insurance Agency Offers Custom Individual Plan Options
-
Press Release6 days ago
CPX returns to GISEC Global for third consecutive year, spotlighting UAE cyber leadership and international growth
-
Press Release4 days ago
BigDeal Car Care CEO Planning Launch of Youth Entrepreneur Coaching Pilot for Iowa Teens
-
Press Release6 days ago
Realpump Empowers Creators with the Launch of a No-Code Web3 Asset Platform
-
Press Release6 days ago
CCY’s Proven Approach to Healthcare Executive Search and Staffing Earns Industry Recognition
-
Press Release5 days ago
Winners Announced for the BREW Nonfiction Book Excellence Award 2025