From bullets to bits

In addition to dealing with cybercriminals and hacktivists, enterprise security managers must pay increasing attention to avoid becoming collateral to nation-state cyber-warfare. Do recent high profile attacks on the region indicate that Middle Eastern businesses are at greater risk of attack, and what damage can cyber warfare inflict?

State secrets

What do Middle East governments need when it comes to security, and are newly formed government entities set to revolutionise the way that states think about security?

FireEye: Cyber warfare defined by espionage and proxy conflicts

The world is still in the foothills of the cyberwar era but already online confrontation is being defined by an unstable and possibly dangerous mixture of proxy conflicts and old-fashioned espionage, mixed with lower-level digital activism, security firm FireEye has said.

Ticking time bomb

The last year has shown more than ever how careful businesses need to be with their data. However, recent reports …

Just in time for Psilog

Spectrum’s acquisition made in 2009 is showing potential for good returns based on Dubai’s positive trading outlook In 2009, Ajay …

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines