Mimecast’s Threat Intelligence Report: Black Hat Edition 2019, revealed that attackers are using either simple, opportunistic attacks or complex, targeted attacks based on necessity to impact the target.
UAE residents trust AI to manage cybersecurity: study
UAE residents online (33 percent) prefer artificial intelligence (AI) to look after their cybersecurity, according to a recent study conducted with YouGov and Palo Alto Networks.
Kaspersky Lab to enhance cybersecurity for blockchain firms
Kaspersky Lab has launched new service packages designed for businesses working in the blockchain industry and crypto economy.
ESET boosts security for Alphabet’s Chronicle
ESET has announced it has partnered with Chronicle, an Alphabet company, to provide essential validation on security incidents and alerts within Backstory, Chronicle’s global cloud service.
Why cybersecurity needs both AI and human intelligence
AI and humans must work together. AI applies power and programming, while human intelligence contributes judgment, imagination, and creativity.
Why partners should bet on services
Mike Herman, vice president, EMEA Channels, Palo Alto Networks, elaborates on channel partner trends that can be expected during the …
Cryptocurrency mining affected millions of users in 2018: Kaspersky Lab
The global outbreak in malicious cryptocurrency mining that unfolded in 2018 saw the number of attacks increase by more than …
ESET joins global anti-ransomware initiative
ESET has been announced as the latest partner of No More Ransom, an international initiative between Europol, the Dutch National Police and major cybersecurity organisations.
Top three ways to justify IT security spending
Proving ROI in IT security has traditionally been a struggle for IT professionals, who need to balance budget limitations while constantly fighting to stay ahead of the dynamic threat landscape.
Cyber-attackers can soon hack brains and manipulate memories, experts warn
In the future, cyber-attackers may be able to exploit memory implants to steal, spy on, alter or control human memories. …
Security in the driving seat for IT innovation in UAE: experts
Security solutions firm RSA has announced its 2019 security predictions shedding light on the trends that will dominate the cybersecurity landscape in the region.
Security no longer an option but an imperative, says Microsoft
It’s no longer an option for businesses across the Middle East and Africa to build secure solutions that deliver value and protect customer data. It’s an imperative, according to Microsoft.
Thoma Bravo to buy majority stake in LogRhythm
Private equity investment firm Thoma Bravo has entered into an agreement to acquire a majority interest in LogRhythm, a next-generation …
Kaspersky Lab to shift key operations to Switzerland
Russian cybersecurity firm Kaspersky Lab recently announced that it will move some its key operations, including customer data storage and software assembly, from Moscow to Zurich, Switzerland.
Centrify expands StarLink partnership to cover EMEA
Centrify, Zero Trust Security provider, has signed a new distribution deal in Europe with StarLink, a value-added distributor in the …
US government officially attributes WannaCry cyber-attack to North Korea
“After careful investigations, the United states is publicly attributing the massive WannaCry cyber-attack to North Korea,” said White House homeland security adviser Tom Bossert.
Oman cybersecurity summit highlights need for resilience strategies
The summit addressed resilience issues that organisations are facing in securely facilitating the exchange of information.
Rise of the machines: How AI tech can help build stronger security defences
As AI tech transform modern IT systems, how can organisations leverage them to build better defences and stay on top of cybersecurity incidents?
The cat and mouse game: AI and machine learning’s role in cybersecurity
As the world swoons over the promise and practice of AI and machine learning, the world of cybersecurity sees both the hero and the villain take part in the game.
8 top cyber-attack maps and how to use them
Most of the cyber-attack maps online today are just ‘eye candy,’ but there are some creative ways they can be used.