By adopting a comprehensive cybersecurity strategy, financial institutions can effectively protect their systems, safeguard sensitive customer data, and maintain their …
Chainalysis report shows cryptocurrency ransomware payments exceeded $1bn in 2023
After an encouraging decline in 2022, the ransomware landscape saw a major escalation in the frequency, scope, and volume of …
The evolution of zero trust
Dave Russell, Vice President, Enterprise Strategy at Veeam explores how zero trust security processes have evolved in recent years and how in a landscape where the benchmark for security is constantly shifting, zero trust must continue to adapt in order to survive.
Juniper Networks: Leveraging AI for cutting-edge data center networking solutions
Anita Joseph caught up with Refat Al-Karmi, Senior Consultant, META at Juniper Networks, to find out more about its recently …
Opinion: Brands must respond to meet heightened customer expectations
James Harvey, CTO Advisor EMEA at Cisco Observability, discusses how brands need to understand that consumers’ expectations of the total …
Qualys announces significant upgrade to its AI-powered platform
Expanded solution brings cloud infrastructure, SaaS apps and externally exposed assets together for a unified view of risk across multi-cloud environments.
Ericsson’s second round of climate targets toward Net Zero approved by science-based initiative
Ericsson committed to reduce absolute scope 1, 2 and 3 greenhouse gas emissions by 90 percent between 2020 levels and the end of 2040.
Safer Internet Day: What lies ahead?
Every day is Safer Internet Day. With data being the soul of businesses as well as virtual and vulnerable, it …
ESET Research discovers espionage apps on the attack in Pakistan, utilising romance scams
The campaign leveraged Google Play to distribute six malicious apps bundled with VajraSpy RAT code; six more were distributed in the wild.
Cloudflare explores the secret to a coordinated, privacy-first security approach
Championing Privacy-First Security: Harmonizing Privacy and Security Compliance.
Positive Technologies helps fix critical vulnerability for popular videoconferencing service Yealink
Yealink has thanked Positive Technologies for discovering the critical vulnerability BDU:2024-00482 in its Yealink Meeting Server videoconferencing system.
Exclusive Feature: Data Privacy
In an era dominated by digital interactions, Data Privacy Day serves as a stark reminder of the vital need to …
SANS Institute Announces Landmark Training Events in Khobar and Riyadh
These training events reiterate Saudi Arabia’s commitment to advanced cybersecurity and nurturing the skills essential for safeguarding its digital future. …
Women in Tech (Pride of Tech) Forum and Awards 2024
The Women in Technology Forum and Awards stands out as a pioneering event in the region, dedicated to celebrating and honoring …
Hikvision: Innovating Beyond Security
Anita Joseph caught up with Wesley Wang, Director of Channel Development & MarCom at Hikvision MEA to learn about the …
Gen AI the key focus at LEAP 2024 as organisers predict record numbers
Organisers of LEAP 2024, the seismic technology event conceived to accelerate the adoption of technology and aid the ongoing transformation …
Interview: Yango is harnessing technology to redefine the business landscape
Anita Joseph caught up with Samer Mohamad, Yasmina Regional Director for MENA at Yango, the global technology company that recently …
PwC Middle East to create 1,000 new jobs following major expansion
PwC Middle East, one of the world’s leading professional services firms, is adding a further 1,000 roles over the next …
Cloudflare report shows DDoS attacks surged in 2023
Cloudflare has announced its 2023 Q4 DDoS report – which showed that DDoS attacks reached new heights in 2023. This …
OPSWAT reiterates commitment to securing regional critical infrastructure on back of strong 2023
OPSWAT opened its Dubai offices in October last year to address the increasing demand across the region for zero-trust cybersecurity solutions capable of safeguarding critical infrastructure.