Your survival guide for the 2022 cyberthreat landscape.

Your survival guide for the 2022 cyberthreat landscape.
As digital transformation accelerates and businesses are faced with disruptions that threaten to put continuity at risk, it is crucial for SMBs …
Cybereason Discovers Global Botnet Campaign Leveraging Microsoft Exchange Vulnerability. The Prometei Botnet crosses many industries and countries globally; Victims are random, making the botnet more dangerous and widespread.
Service accounts are a particular type of non-human privileged account used to execute applications and run automated services, virtual machine instances, and other processes. These accounts can be privileged local or domain accounts, and in some cases, they may have domain administrative privileges. This high level of privilege facilitates the smooth operation of many IT workflows, but a single service account can easily be referenced in many applications or processes. This interconnection, along with the critical nature of their usage, makes them very difficult to manage.
BeyondTrust Privilege Management for Unix & Linux Grows Q4 Revenue 83% YoY by Securing Cloud Infrastructure.
The achievements reflect BeyondTrust’s commitment to ensuring customer data is safe from the most sophisticated methods of intrusion for its 3,000+ cloud customers
Privileged password management works hand-in-hand with implementing least privilege and should be a foundational element of any organisation’s PAM initiatives.
ESET has been announced as the latest partner of No More Ransom, an international initiative between Europol, the Dutch National Police and major cybersecurity organisations.
In what could lead to a significant change in how Windows users could get along creating software for robotics, Microsoft …
Gartner reported that in the third quarter of 2017, worldwide server revenue increased 16 percent year over year, while shipments …
Worldwide server revenue increased 2.8 percent year over year in the second quarter of 2017, while shipments grew 2.4 percent …
QNAP Systems has released the TVS-1582TU – a 19-inch rack-mountable Thunderbolt 3 NAS that is suited for moving vehicles and outdoor media …
A newly discovered flaw in widely used networking software leaves tens of thousands of computers potentially vulnerable to an attack …
It’s the end of the line for Intel’s Itanium chip, a troubled processor family that spawned many product delays and …
Throughout his career, ‘startup specialist’ Surendra Shetty has had a knack for building technology from the ground up. The UAE Exchange CIO cut his teeth at a range of financial organisations across India, and is now relishing the challenge of sitting in the company’s IT hotseat.
Frank Basinski, Director, Partner Programs and Enablement, Red Hat EMEA, explains how open source can be an enabler in the digital era.
Budget planning is typically a give-and-take exercise, since all departments are fighting for those corporate dollars. Mathias Thurman from the Security Manager’s Journal discusses the importance of securing budgets for IT security.
There has been a dramatic increase in cyberattacks on critical infrastructure but regional organisations remain unprepared.
We caught up with Tyson Macaulay, Chief Security Strategist and Vice President, Security Services, Fortinet, during his recent visit to Dubai to talk about a range of security issues surrounding the IT landscape.
Qualys has announced an OEM partnership with HEAT Software to deliver a cloud-based patch management offering to its global customers.