As the Senate prepares to take another stab at passing a comprehensive cyber security bill, a new report shows the …
Politician slams EU cyber security strategy
The European Commission’s latest cyber security strategy has been slammed by a member of the European Parliament, who accused the …
Experts call for cyber security doctrine from US government
The U.S. government needs a comprehensive doctrine addressing cyber security instead of the current patchwork of policies and agencies dealing …
EU’s cyber security budget dubbed “paltry”
Despite vowing that fighting cybercrime is high on its agenda, the European Commission increased its planned cyber security budget by …
UN’s civil aviation body recommends cyber security task force
The U.N.’s civil aviation body will recommend creating a cyber security task force at a meeting next week in Canada, …
DWTC to organise region’s largest cyber security conference in 2013
As corporates and individuals in the Middle East continue to witness a steady rise in cyber attacks, industry experts believe …
Zayed University and AccessData partner to promote cyber security
Zayed University and AccessData Group, which provides digital investigations and litigation support, have announced a joint collaboration in an effort …
WHO-like global cyber security group needed to tackle cyber threats: Kundra
The formation of a global cyber security group similar to the World Health Organisation (WHO) is required in order to …
Harris Atlas discusses cyber security at roundtable
The world is at the precipice of a migration of technologies according to Dale Meyerrose, VP and GM of Cyberspace …
Secure Computing’s Cyber Security Initiative Complying with CIP
Secure Computing recently unveiled its Cyber Security Initiative, which aims to increase awareness on the importance of complying with Critical …
Entrust fights cyberattacks with AI-powered identity-centric security solution
Building on the Onfido acquisition, Entrust can now combine AI-powered biometrics and global Identity Verification with Identity & Access Management in an integrated solution.
“We’re more than just a cybersecurity company” – Rami Nehme – OPSWAT
CNME Editor Mark Forker spoke to Rami Nehme, Regional Sales Director, South Gulf, Levant & Pakistan at GISEC 2024, to …
Interview: OTIFYD’s intelligent approach to cybersecurity
Serkan Yusuf, Director of Services at OTIFYD, tells Tahawultech about OTIFYD’s cutting-edge cybersecurity services and solutions that leverage strategy to …
Cisco study reveals 91% of UAE companies use AI in their cybersecurity strategies
The persistence of the cyber talent gap underscores the need for innovative solutions, with 90% of companies highlighting talent shortage as an issue.
Group-IB and National Security Services Group join forces to bolster cybersecurity in the Middle East
Group-IB and National Security Services Group Sign Memorandum of Understanding to strengthen cybersecurity offerings in the Middle East.
Help AG Unveils Top Digital Threats and Trends in Cybersecurity
Help AG, the Middle East’s premier enterprise security advisor, took center stage at the Gulf Information Security Expo and Conference …
OPSWAT on a mission to tackle skills gap in the cybersecurity industry
Irfan Shakeel, Vice President – Training & Certificate Services at OPSWAT, spoke to CNME Editor Mark Forker at GISEC 2024, to highlight the role they are playing in bridging the skills gap in the cybersecurity industry through their OPSWAT Academy training programs.
Check Point highlights unique cybersecurity capabilities at GISEC 2024
Ram Narayanan, Country Manager Middle East at Check Point, discusses the company’s cutting-edge Infinity Platform powered by AI.
LinkShadow showcases breakthrough cybersecurity solutions at GISEC 2024
Ahmad Fida Weldali, Regional Sales Director for UAE, Oman, Qatar, Kuwait, Bahrain, Egypt and LEVANT says LinkShadow’s NDR is preferred by decision makers for its end-to-end visualization and faster decision making.
A holistic approach to cybersecurity
Sultan Mahmood Malik, CSO at Huawei Gulf North discusses how the company follows an end-to-end comprehensive approach to cybersecurity and how customers come first at every stage.