Cybersecurity stocks are soaring as a vicious new form of malware has left thousands of computers grounded, according a CNBC …

Cybersecurity stocks are soaring as a vicious new form of malware has left thousands of computers grounded, according a CNBC …
Microsoft released security patches on Tuesday for 55 vulnerabilities across the company’s products, including for three flaws that are already …
Aptec, an Ingram Micro company, has announced its inaugural participation at the upcoming 2017 Gulf Information Security Expo and Conference …
Regional security VAD StarLink will host its seventh annual IT Security Roadshow taking place in nine countries across the Middle …
Mohammed Abukhater, Regional Director, Middle East and North Africa, FireEye, discusses the risks brought by insider threats and what it means for your business.
The distributor is showcasing its new vendor partnerships, including those with SentinelOne, Gemalto and Carbon Black, while also displaying the strengths of its existing brands such as Fortinet, FireEye, F5 Networks and Infoblox.
DarkMatter, the first ever Cyber Security Innovation Partner for GITEX Technology Week, is making its debut at the 2016 issue of the trade show. The company is also showcasing its ‘Resiliency Model,’ a proprietary methodology that focuses on the interconnected impact of a cyber-incident on varying critical national infrastructure entities.
FireEye Founder, Vice Chairman and CTO Ashar Aziz discusses the company’s transition to an as-a-service model – and his vision for the impact of a “cyber-geddon” – with Security Advisor Middle East.
There has been a dramatic increase in cyberattacks on critical infrastructure but regional organisations remain unprepared.
Carolyn Crandall, CMO, Attivo Networks, discusses how security teams can gain the upper hand by going on the offense and creating an environment that provides continuous real-time detection against an ever-changing landscape of cyber threats.
From SDN to cloud, the transition to any modern technology requires careful management. This all starts in the data centre, where carefully chosen solutions can give the enterprise the best chance of success in terms of security.
Exclusive Networks, which is celebrating its 10th anniversary as a security value-added distributor, is showcasing solutions from its partners such as Fortinet, F5, LogRhythm, Lumension, FireEye and Infoblox.
Highly publicised events have demonstrated that it is now more difficult than ever to protect an organisation’s internal data. Advances in technology and productivity tools have made collaboration in the workplace easier, while also creating new vectors for data to leave the organisation.
Exclusive Networks has announced its move to larger quarters located in the same building as the current office effective in October.
More and more, headlines are drawing attention to instances of cyber-espionage. Beyond basic hacking, cyber-espionage targets governments or companies with the goal of extracting information or trade secrets. In this secret world, what motivates these hackers and what can be done to stop them.
As various emerging technologies become popular in business environments, security is a prime concern for organisations. Reseller Middle East explores how partners can make the most of the opportunities present here.
Next-generation endpoint protection vendor SentinelOne’s new endpoint protection platform, called EPP, has won an Approved Corporate Endpoint Protection seal of approval from AV-Test.
Help AG has signed new Authorised Solution Partner (ASP) and Security Service Provider (SSP) partnership agreements with Bit9 + Carbon Black in the GCC.
Companies can spend untold funds on the latest security software, keep their firewalls and security infrastructure up-to-date, monitor networks, and employ the highest level of IT talent all in the name of security. However, it can all be rendered useless by one simple thing – employees choosing to ignore basic regulations.
It can be painful for an organisation to admit that their systems have been breached by a cyber-criminal. However, as cyber-attacks become more aggressive, it is essential that data on cyber-criminality is shared and analysed. It may be that sharing this data, even among competitors, will be the key to protecting our most sensitive information.