Emad Fahmy is currently the Systems Engineering Manager at NETSCOUT. In this op-ed he discusses how packet data can support the crucial task of protecting digital landscapes from cybersecurity threats.
Special Feature: Data Security in the Banking and Financial Sectors
By adopting a comprehensive cybersecurity strategy, financial institutions can effectively protect their systems, safeguard sensitive customer data, and maintain their …
Criminals leverage “as-a-service” business model with Sha Zhu Pan Kits
After a Two-Year Investigation, Sophos X-Ops Discovers Unprecedented Sophistication in Scams That Trick Victims into Fake Investments.
Safer Internet Day: What lies ahead?
Every day is Safer Internet Day. With data being the soul of businesses as well as virtual and vulnerable, it …
SANS Institute to enhance Middle East Cyber Defence with SANS Abu Dhabi February 2024
Expert instructors from SANS Institute will host specialized training in ICS security, as well as the latest threat hunting and incident response tactics in the Gulf Region.
Positive Technologies helps fix critical vulnerability for popular videoconferencing service Yealink
Yealink has thanked Positive Technologies for discovering the critical vulnerability BDU:2024-00482 in its Yealink Meeting Server videoconferencing system.
Exclusive Feature: Data Privacy
In an era dominated by digital interactions, Data Privacy Day serves as a stark reminder of the vital need to …
Cloudflare report shows DDoS attacks surged in 2023
Cloudflare has announced its 2023 Q4 DDoS report – which showed that DDoS attacks reached new heights in 2023. This …
Sophos positioned as leader in the 2023 Gartner Magic Quadrant for endpoint protection platforms
Sophos Positioned as Leader in the 2023 Gartner Magic Quadrant for Endpoint Protection Platforms for the 14th Consecutive Time.
Google Cloud highlight how Gen AI will be a double-edge sword in cybersecurity
Google Cloud has released its annual Cybersecurity Forecast report for 2024, compiling forward-looking thoughts from security leaders and experts from …
Generative AI gets the top billing as Vectra releases its cybersecurity predictions for 2024
Vectra AI, Inc., the leader in hybrid attack detection, investigation and response, has announced the release of its annual threat …
New research from Qualys shows the highest risks organizations faced in 2023
Qualys, Inc (NASDAQ: QLYS), has released new research from the Qualys Threat Research Unit (TRU), delving into some of the critical vulnerabilities …
Opinion: VPNs have had their day; it’s time to pin the badge on a new sheriff
Toni El Inati – RVP Sales META & CEE at Barracuda Networks, argues that VPNs have had their day and …
Navigating the Festive Cyber Landscape: Ensuring Online Safety during Holiday Shopping
Tahawultech.com spoke to cybersecurity industry frontrunners to learn more about the pitfalls of online shopping and tips to shop safely …
Opinion: Role of AI in cybersecurity
Steven Kenny, Architect & Engineering Program Manager EMEA at Axis Communications, writes an exclusive opinion piece for Tahawultech.com on how …
Predatory SpyLoan apps: loan sharks expand range to Android, ESET Research finds
ESET researchers have observed an alarming growth in deceptive Android loan apps which present themselves as legitimate personal loan services, …
Security Navigator 2024 reveals highest number of Cyber Extortion victims ever recorded
New research finds a new levelling of physical and cyber battlefields, revealing a thin line between physical war and cyber (through hacktivism)
2024 predictions from Entrust
It’s the year of reckoning for the identity crisis: The decentralised identity movement goes mainstream in the age of AI
2024 predictions from Veritas Technologies
Those who embrace emerging technologies to drive innovation and strengthen their security posture whilst building policies and guardrails for compliant usage, are the ones who will flourish in 2024.
5 tips to stay out of the Phishing trap
Establishing a paranoid but blame free culture that reports suspicious activity — as well as genuine mistakes — early and often helps ensure incidents (no matter how rare) are reported as soon as possible.