Almost all data breaches involve the use of legitimate login credentials. Guarding against these ‘insider threats’ requires the ability to detect when cybercriminals are using stolen credentials.
Resources
Enterprise Security IT Software Management Big Data Enterprise Group Business White paperState of security operations 2016 2016 report of capabilities …
Cisco Annual Security Report reveals decline in defender confidence
The Cisco 2016 Annual Security Report reveals that only 45 percent of organisations worldwide are confident in their security posture as today’s attackers launch more sophisticated, bold and resilient campaigns.
Palo Alto ME releases 2016 cyber security trends
Saeed Agha, General Manager, Palo Alto Networks Middle East, recently revealed a few cybersecurity trends that the company foresees this year.
Path to protection
When it comes to IT security, the writing has been on the wall for some time. What lessons can be learned from 2015, as even more high profile organisations have fallen victim to cyber-attacks? And what lies in store for the year ahead?
On the right rack
The transition from hardware to software and on-premise to as-a-service models puts unprecedented pressure on the network. What lies in store for the networking industry in 2016? Which technologies will see higher uptake, and which will be phased out?
Over 2 million UAE consumers experienced cyber crime in 2015
Norton by Symantec recently released its findings from the Norton Cybersecurity Insights Report revealing over 2 million UAE citizens experienced cybercrime in the past year.
Evolution of security compliance
Hadi Jaafarawi, Managing Director, Qualys Middle East, discusses how cybersecurity will continue to grow and improve.
Infoblox launches Q3 2015 DNS Threat Index
Infoblox recently announced that the creation of DNS infrastructure by cybercriminals to unleash exploit kits increased 75 percent in third quarter of 2015 from the same period in 2014, as reported in the newest edition of the Infoblox DNS Threat Index.
Fortinet to ‘Break the Kill Chain’ at GITEX 2015
Fortinet will be focusing on on Advanced Threat Protection (ATP), and will host live demonstrations of its APT solutions, at GITEX Technology Week.
US, China reach cyberespionage agreement
The US and China have reached their first ever cybercrime and cyberespionage agreement. Leaders of both countries announced the deal in Washington on after two days of top-level talk.
Spy games
More and more, headlines are drawing attention to instances of cyber-espionage. Beyond basic hacking, cyber-espionage targets governments or companies with the goal of extracting information or trade secrets. In this secret world, what motivates these hackers and what can be done to stop them.
Cyber vigilance
Radwan Moussalli, Senior Vice President – Middle East, Central Asia and Africa, Tata Communications, talks about the emerging security concerns in the digital age and how organisations can tackle these threats.
Symantec uncovers Morpho hacking activities
A cyber espionage group has targeted high-profile technology, Internet, commodities and pharmaceutical companies in the US, Europe and Canada, reports Symantec.
Cisco to implement ‘Security Everywhere’ strategy
Cisco has announced new offerings to embed security throughout the extended network – from the data centre out to endpoints, branch offices, and the cloud – for pervasive threat visibility and control.
Cisco to embed ‘Security Everywhere’ across the extended network
Cisco has announced new offerings to embed security throughout the extended network – from the data centre out to endpoints, branch offices, and the cloud – for pervasive threat visibility and control.
How to rethink security to beat tomorrow’s threats
Johnny Karam, Regional Vice President, Middle East and Africa (MEA), Citrix, talks about the changing landscape of enterprise IT and the new models of security.
Resilient Systems: 46% of ME businesses lack IR plans
According to the findings of a survey conducted Resilient Systems at GISEC, it has been revealed that nearly half (46 percent) of Middle East organisations have no Incident Response (IR) plans.
Resilient Systems: 46 percent of ME businesses lack IR plans
According to the findings of a survey conducted Resilient Systems at GISEC, it has been revealed that nearly half (46 percent) of Middle East organisations have no Incident Response (IR) plans.
EMEA’s finance sector hit by growing web fraud threats
According to a new survey commissioned by F5 Networks, financial services organisations across EMEA are increasingly exposed to and concerned about the rising menace of web fraud threats.