StarLink has been awarded ‘Identity and Data Protection Solutions Distributor of the Year’ by Gemalto at their Middle East Partner Summit 2016.
Gemalto wins accolade at 2016 Cybersecurity Excellence Awards
The firm’s SafeNet Authentication Service was voted ‘Best Multi-Factor Authentication Service’ by the 300,000 member LinkedIn Information Security Community.
Exclusive Networks, Gemalto expand partnership
Exclusive Networks Middle East has announced a new strategic relationship with Gemalto, to be its value-added distributor in the Middle East region.
Gemalto receives MasterCard approval for cloud-based payments
Gemalto recently announced cloud payment that they are the first mobile payment vendor to receive full MasterCard approval for a complete Cloud-Based Payment (CBP) solution.
Gemalto to highlight ‘Internet of Secure Things’ at GITEX
Gemalto will showcase its vision for a seamlessly connected, secure and sustainable digital future at this year’s GITEX Technology Week.
OMA Emirates launches managed services for banks
OMA Emirates has announced the company’s launch of end-to-end OMA Managed Services for banks at Cards & Payments Middle East 2015.
Gemalto’s 2015 Data Security Confidence Index released
The report reveals a widening gap emerging between the perception and the reality of perimeter security effectiveness among global IT decision makers.
Cyber subversives
Debating political issues, promoting free speech, and supporting human rights, the illegal cyber activities of hacktivists divide opinion. Are they criminals like any other, or are their cases of their work justifying their underhand means?
Hacker headspace
With cybercrime an ever-present danger, hackers around the world attack user data for financial and political gain. But they are not all bad. CNME takes a look at the mindset of hackers good and evil, and how they constantly ask questions of governments and top companies.
Virtual lock down
Virtualisation has made the data centre a more flexible and agile place. However, the trade-off in this software-defined shift is a measure of complexity when it comes to protecting our data. Enterprises must reconsider their protection strategy to reflect the new, virtualised world.
The death of Internet privacy
In the age of constant connection, internet users are sharing more and more sensitive information online. As hackers become more organised and the amount of data stored in the cloud increases, the potential for leaks of sensitive data becomes magnified.
StarLink hosts 3rd annual Security Advisory Summit
StarLink has conducted its Annual Security Advisory Summit on December 9th, 2013 at the Burj Al Arab Hotel in Dubai. …
European Parliament cuts Wi-Fi after French researcher hacks email accounts
The European Parliament has cut access to its public Wi-Fi network after detecting a man-in-the-middle attack on a number of email accounts apparently carried out by a white hat researcher out to expose poor security at the institution.
Security-as-a-Service: IT's Dark Knight?
As hackers and attackers wreak havoc on the industry, businesses have been looking for a watchful protector to secure their assets. Is security-as-a-service the IT industry’s Dark Knight?
Oracle and Salesforce.com's love-fest: The ripple effects
While certain recent announcements weren’t as “startling” as Oracle CEO Larry Ellison had promised they would be, its deal with Salesforce.com definitely lived up to the hype and could have some lasting ramifications.
Ticking time bomb
The last year has shown more than ever how careful businesses need to be with their data. However, recent reports …
Target located
In 1971, John Draper used a whistle, found in a cereal box, to reproduce a 2,600 Hz tone able to …
The security guide to BYOD
There’s no use in trying to resist it – BYOD is here to stay. To help in the transition, CNME …
Eye of the storm
Experts recently pointed towards security as the main obstacle for adoption of all cloud types and claimed that cloud security …
Channels of profit
Times have never been better for security-focused channel partners. The fast changing threat landscape and the emergence of advanced threats …