Kaspersky expands its Cyber Immune offering for IoT protection with new Kaspersky IoT Secure Gateway 1000.
The challenge of shared responsibility in the cloud – Whose keys are they, anyway?
By Sebastien Pavie, VP Data Protection Products, Southern EMEA at THALES Key management – the processing, management and storage of …
Redington promotes innovation at GITEX 2022
Redington Value, the top value-added distributor (VAD) in the Middle East and Africa, is at the forefront of the movement …
Opinion: Meeting the new challenges of EnemyBot head-on
Maher Jadallah, Senior Director Middle East & North Africa at Tenable Botnets first gained widespread notoriety in the early 2000s …
Acronis report indicates ransomware damages to exceed $30bn by 2023
Acronis, a global leader in cyber protection, unveiled its mid-year cyberthreats report, and the results of the report are worrying …
Core Network Services for the Modern Hybrid Workplace
Core Network Services for the Modern Hybrid Workplace.
Commvault RVP highlights the ‘power’ of its solutions in record breaking year
CNME Editor Mark Forker spoke to Fady Richmany, Regional Vice President, SEEMEA at Commvault, to find out how the company’s solutions such as the Power of AND are empowering their clients with the ability to accelerate their digital transformation journey, which has laid the foundations for their best-ever fiscal performance.
Attacker Dwell Time Increased by 36%, Sophos’ Active Adversary Playbook 2022 Reveals
Attacker Dwell Time Increased by 36%, Sophos’ Active Adversary Playbook 2022 Reveals.
Individuals found to be the top attack sector for cybercriminals – New research from Trellix
Individuals found to be the top attack sector for cybercriminals – New research from Trellix.
Attempts to exploit MS Exchange and password guessing were the most frequent intrusion vectors
ESET Threat Report: Attempts to exploit MS Exchange and massive waves of password guessing were the most frequent intrusion vectors.
HP finds cybercriminals Excel-ing at tricking users
Stealthy techniques and growing Excel malware campaigns are putting victims in the crosshairs of ransomware gangs.
Rise in ransomware spell end of business-as-usual
Brian Pinnock, Cybersecurity Expert at Mimecast talks more on ransomware attacks in the region and the strategy organisations need to adopt to prevent them.
Integrated Managed Services and InfoSec: Taking a Platform-based approach to mitigating threats
Integrated Managed Services and InfoSec: Taking a Platform-based approach to mitigating threats.
Logitech Expands its Touch Screen Controller Solutions Inside and Outside the Meeting Room
Logitech Expands its Touch Screen Controller Solutions Inside and Outside the Meeting Room. Tap IP and Tap Scheduler Deliver Simple, Efficient Meeting Experiences for Hybrid Work.
Three risks putting hybrid work models in danger
Hybrid work models offer a plethora of potential attack surfaces, with remote working employees especially vulnerable due to the generally lower levels of protection against cyberattacks on home networks and personal devices.
Attacks on MS Exchange grew by 182% in the United Arab Emirates in August
Attacks on MS Exchange grew by 182% in the United Arab Emirates in August.
Nutanix Extends Ransomware Protections to Help Customers
Nutanix Extends Ransomware Protections to Help Secure Customers’ IT Environments. Hybrid and multi-cloud leader strengthens networking, storage and virtualisation services.
Tenable’s analysis reveals over 22 billion records exposed
Tenable’s analysis of data breaches in 2020 reveals over 22 billion records exposed.
Qualys offering free tools to reduce risk from breaches
Qualys offers free 60-day integrated Vulnerability Management, Detection and Response service to help organisations quickly assess devices impacted by SolarWinds Orion vulnerabilities, SUNBURST Trojan detections, and FireEye Red Team tools, and to remediate and track results via dynamic dashboards
New report examines how cybercriminals exploit Office 365 vulnerabilities
A new report published by Vectra examined how cybercriminals are using built-in Office 365 services in their attacks on enterprises.