The purpose of Data Privacy Day is to raise awareness and promote privacy and data protection best practices. Wim Stoop, …

The purpose of Data Privacy Day is to raise awareness and promote privacy and data protection best practices. Wim Stoop, …
Delinea Delivers Privileged Access Management Enhancements on the Latest Macs to Reduce Risk of Cyber Attacks Through Workstations .
CPI’s Nitya Ravi interviewed Jamil Abu Aqel, Sales Engineering Director, Emerging Region, Mandiant about their hopes for GISEC 2022 and what Mandiant Validation and how it helps businesses to get quantifiable cybersecurity data.
Cisco has conducted research to discover the top malware threats across industries in 2020 with in its new “DNS Security” report. It follows extensive analysis of malicious DNS activity and threats from January to December last year.
In addition to the direct effects of the COVID-19 pandemic, we also saw a sharp rise in cybercriminal activity. From simple phishing attacks to one of the largest DDoS attacks ever recorded, we saw the cyber threat landscape evolve and grow. At the same time, we also saw a rapid growth in the tech and cyber security industry.
The United Arab Emirates’ telecommunications regulator has said that it foiled more than 1,000 cyber attacks on government and private company websites last year.
Investing in anti-virus software is no longer enough to counter cyber attacks on vital data systems, especially if national security is at stake.
Researchers following a cyber espionage campaign apparently bent on stealing drone-related technology secrets have found additional malware related to the …
According to a new data breach report from Verizon, authentication attacks and “hacktivism” will continue to pose a threat to …
Evidence collected from a website that was recently used to flood U.S. banks with junk traffic suggests that the people …
Groups of companies in the same industry could pool infrastructure resources to help each other mitigate the effects of cyber …
According to a survey of 56 corporate and governmental organisations conducted by the Ponemon Institute, the average amount paid for …
A growing army of malware delivery networks, known as malnets, account for two thirds of all cyber attacks, and security …
Cyber attackers who disrupted the websites of U.S. banks over the last two weeks used a highly sophisticated toolkit — …
A cyber security think tank has published a manual studying how international law applies to conflicts in cyberspace, where the …
U.S. President Barack Obama ordered the Stuxnet cyber attacks on Iran in an effort to slow the country’s development of …
Security engineers at the University of Tulsa have found a way to identify cyber attacks before they reach their target, …
This is a sign of the increasingly digital world we live in: the Pentagon is set to make it official …
In his keynote address of the MEITSEC 2008, H.E. Mohamed Al Ghanim, director general of the UAE Telecommunications Regulatory Authority …
70% of workers at manufacturing companies in the UAE believe there are considerable risks due to potential cyberattacks on robots, …