Steering clear of insider threats

Almost all data breaches involve the use of legitimate login credentials. Guarding against these ‘insider threats’ requires the ability to detect when cybercriminals are using stolen credentials.

Resources

Enterprise Security IT Software Management Big Data Enterprise Group Business White paperState of security operations 2016 2016 report of capabilities …

Path to protection

When it comes to IT security, the writing has been on the wall for some time. What lessons can be learned from 2015, as even more high profile organisations have fallen victim to cyber-attacks? And what lies in store for the year ahead?

network MENA

On the right rack

The transition from hardware to software and on-premise to as-a-service models puts unprecedented pressure on the network. What lies in store for the networking industry in 2016? Which technologies will see higher uptake, and which will be phased out?

Infoblox launches Q3 2015 DNS Threat Index

Infoblox recently announced that the creation of DNS infrastructure by cybercriminals to unleash exploit kits increased 75 percent in third quarter of 2015 from the same period in 2014, as reported in the newest edition of the Infoblox DNS Threat Index.

Spy games

More and more, headlines are drawing attention to instances of cyber-espionage. Beyond basic hacking, cyber-espionage targets governments or companies with the goal of extracting information or trade secrets. In this secret world, what motivates these hackers and what can be done to stop them.

Cyber vigilance

Radwan Moussalli, Senior Vice President – Middle East, Central Asia and Africa, Tata Communications, talks about the emerging security concerns in the digital age and how organisations can tackle these threats.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines