Cybercriminals need less than a week after a critical vulnerability is disclosed to develop and post experimental exploits on the dark web, ready for use in attacks.

Cybercriminals need less than a week after a critical vulnerability is disclosed to develop and post experimental exploits on the dark web, ready for use in attacks.
New research by Chainalysis, the blockchain data company, has shown that while the year to date (YTD) flow of crypto …
Rick Vanover, Vice President of Product Strategy, Veeam, explores the potential and the processes organisations need to consider before powering their data resilience with AI.
Mithil Ajmera, Co-Founder and COO of Sav, has penned a thought-leadership article, which highlights the top 10 ways money-management apps …
According to a new strategy guide from the SANS Institute, “Navigating the Path to a State of Zero Trust in 2024,” businesses often stumble over key obstacles in their journey towards Zero Trust adoption.
According to new research from the Qualys Threat Research Unit (TRU), between January to mid-July, the CVE count rose by …
Arafat Yousef, Managing Director, Middle East & Africa at Aginode, believes that Fibre To The Office (FTTO) is a forward-looking …
Rodolph Khoury, Managing Director – Dubai & Northern Emirates, Avaya, has written a thought leadership article in which he makes …
Bashar Bashaireh, Managing Director & Head of Middle East and Türkiye at Cloudflare, discusses the need for a different type of cloud—one that delivers secure, performant, any-to-any connectivity.
The massive, worldwide outage of Windows computers caused by a bug in CrowdStrike software underscores a lesson we should all take to heart: You shouldn’t run critical network services (such as DNS and DHCP) on Windows Servers.
Jeff Stewart, VP of Product at SolarWinds, has penned an op-ed, which examines how IT leaders need to optimise observability …
Jonathan Marsh – Vice President, Strategy at WSO2 has penned an op-ed that takes a much closer look at Open …
Fred Lherault, Field CTO, EMEA Emerging at Pure Storage, has penned a thought leadership article that examines the continued evolution …
Ransomware Groups Weaponize Stolen Data to Increase Pressure on Targets Who Refuse to Pay.