Detecting and not falling prey to these kinds of attacks are crucial, but the ability to takedown lookalike domains is equally important. Lookalike domain attacks are increasing in sophistication and prevalence, making specialized solutions like DNS security a must-have for all.
Generative AI gets the top billing as Vectra releases its cybersecurity predictions for 2024
Vectra AI, Inc., the leader in hybrid attack detection, investigation and response, has announced the release of its annual threat …
How telecommunications providers can best tackle DDoS attacks
In 2024, the telecommunications industry will continue to focus on technologies such as cloud computing, standalone 5G, AI, and the Internet of Things (IoT) to offer better speed, scalability, and innovation.
Opinion: Answer Six Big Questions to Choose the Right Customer Engagement Platform
Kunal Badiani, Regional Head, MoEngage – Middle East, Africa and Turkey, on how critical evaluation involves asking relevant questions related …
Opinion: Veeam CTO examines if we are winning the fight against Ransomware
Edwin Weijdema, Field CTO EMEA and Lead Cybersecurity Technologist at Veeam, has penned an exclusive op-ed for tahawultech.com, in which …
New research from Qualys shows the highest risks organizations faced in 2023
Qualys, Inc (NASDAQ: QLYS), has released new research from the Qualys Threat Research Unit (TRU), delving into some of the critical vulnerabilities …
Laying the groundwork for a successful digital future
In an exclusive interview with Tahawul Tech, Travers Nicholas, Managing Director – Qatar at Dell Technologies, spoke to us about how Dell is helping Qatar harness these opportunities.
SolarWinds predicts key trends and themes that will define enterprise IT in 2024
Enterprises will leverage advanced artificial intelligence and automation capabilities to accelerate transparency, growth, and productivity.
Official Python repository served cyberespionage backdoor, gathered 10,000+ downloads
ESET Research discovered 116 malicious packages in PyPI, the official repository of software for the Python programming language, uploaded across 53 projects. Victims have downloaded these packages over 10,000 times.
The next evolution of partner autonomy: Why partners should build their business with Nutanix
Nutanix is committed to helping partners drive customer success in the ever-evolving IT landscape.
Tenable study reveals 40% of cyberattacks breach Saudi Arabian organisations’ defences
Security teams are so busy remediating cyberattacks that they don’t have time or resources to focus efforts on strengthening defences to deflect and protect against them.
Innovating Finance: UAE’s Pioneering Role in the Blockchain and Crypto Landscape
Talal Shaikh, Associate Professor at Mathematical and Computer Sciences, Heriot-Watt University Dubai, writes an exclusive article for Tahawultech.com on the …
Epicor RVP highlights the need to put ‘people first’ when it comes to ERP automation
Vibhu Kapoor, Regional Vice President – Middle East, Africa & India at Epicor, has penned an exclusive op-ed for December’s …
“Bad digital experiences are causing anxiety” – James Harvey, CTO, Cisco Observability
James Harvey, CTO Advisor EMEA, at Cisco Observability, has reiterated the importance of brands of delivering seamless digital experiences this …