Gaurav Mohan, VP, SAARC & Middle East, NETSCOUT explains how depending solely on endpoint detection is not enough to protect …


Gaurav Mohan, VP, SAARC & Middle East, NETSCOUT explains how depending solely on endpoint detection is not enough to protect …

Infoblox rebrand initiatives reflect confidence and business focus, positioning its critical role in securing the networks of some of the world’s largest companies, appealing to both networking and security professionals alike.

As the Middle East makes a concerted effort to grow its knowledge and skills-based economy, the role of data in driving innovation, transformation and success cannot be overstated.

The average cost of a data breach in the region is $6 million, as per IBM.

The purpose of Data Privacy Day is to raise awareness and promote privacy and data protection best practices. Wim Stoop, …

Delinea Delivers Privileged Access Management Enhancements on the Latest Macs to Reduce Risk of Cyber Attacks Through Workstations .

CPI’s Nitya Ravi interviewed Jamil Abu Aqel, Sales Engineering Director, Emerging Region, Mandiant about their hopes for GISEC 2022 and what Mandiant Validation and how it helps businesses to get quantifiable cybersecurity data.

Cisco has conducted research to discover the top malware threats across industries in 2020 with in its new “DNS Security” report. It follows extensive analysis of malicious DNS activity and threats from January to December last year.

In addition to the direct effects of the COVID-19 pandemic, we also saw a sharp rise in cybercriminal activity. From simple phishing attacks to one of the largest DDoS attacks ever recorded, we saw the cyber threat landscape evolve and grow. At the same time, we also saw a rapid growth in the tech and cyber security industry.

The United Arab Emirates’ telecommunications regulator has said that it foiled more than 1,000 cyber attacks on government and private company websites last year.

Investing in anti-virus software is no longer enough to counter cyber attacks on vital data systems, especially if national security is at stake.

Researchers following a cyber espionage campaign apparently bent on stealing drone-related technology secrets have found additional malware related to the …

According to a new data breach report from Verizon, authentication attacks and “hacktivism” will continue to pose a threat to …

Evidence collected from a website that was recently used to flood U.S. banks with junk traffic suggests that the people …

Groups of companies in the same industry could pool infrastructure resources to help each other mitigate the effects of cyber …

According to a survey of 56 corporate and governmental organisations conducted by the Ponemon Institute, the average amount paid for …

A growing army of malware delivery networks, known as malnets, account for two thirds of all cyber attacks, and security …

Cyber attackers who disrupted the websites of U.S. banks over the last two weeks used a highly sophisticated toolkit — …

A cyber security think tank has published a manual studying how international law applies to conflicts in cyberspace, where the …

U.S. President Barack Obama ordered the Stuxnet cyber attacks on Iran in an effort to slow the country’s development of …