Cloudflare Democratises Spoof-Proof Security; Makes Hardware Security Keys More Accessible Than Ever for Millions of Customers Because it’s Good for the Internet.
5 reasons to keep your software and devices up to date
5 reasons to keep your software and devices up to date.
Veritas introduces Veritas Alta
Veritas Introduces Veritas Alta: The Industry’s Most Comprehensive Cloud Data Management Platform.
Making communication simple
Veronica Martin caught up with JS Wong, CEO at SendQuick to discuss GITEX 2022 and the company’s plans for the region.
Thales special interview: How can employees help bolster data security?
By Sebastien Pavie, VP Data Protection Products, Southern EMEA at THALES Hardly a day passes without hearing of a new …
The challenge of shared responsibility in the cloud – Whose keys are they, anyway?
By Sebastien Pavie, VP Data Protection Products, Southern EMEA at THALES Key management – the processing, management and storage of …
How can employees help bolster data security?
Sebastien Pavie, Thales, dives into the cyber threat landscape and how employees can better prepare themselves for the onslaught from hackers.
The power of threat intelligence
Amir Kanaan, Managing Director for the Middle East Turkey and Africa at Kaspersky outlines how their operations have evolved, the impact of threat intelligence and the importance of SOCs.
Genesys is prepared for the ‘decade of disruption’
Evren Aker, Director of Partnerships, Genesys, META and France outlines the issues frequently encountered with cloud transformation as well as the ‘decade of disruption’.
Special Interview: The Power of Threat Intelligence
Amir Kanaan, Managing Director for the Middle East, Turkey and Africa at Kaspersky tells Anita Joseph why Threat Intelligence is essential …
ServiceNow to aid organisations with “Tokyo”
ServiceNow Unveils the Now Platform “Tokyo” Release to Help Organisations Drive Business Transformation Amid Complex Macro Environment.
Infoblox report shows smishing in websites built on WordPress
Smishing has been identified as a new and sophisticated method of obtaining personal and financial information from victims by using …
What are the links between artificial intelligence and industry 4.0
How Explainable Artificial Intelligence Can Propel the Growth of Industry 4.0.
79% of Saudi companies are putting customers at risk of fraudulent emails
Proofpoint research reveals 79% of top Saudi companies are putting customers at risk of receiving fraudulent emails.
Smishing vs. Phishing: Understanding the Differences
Smishing vs. Phishing: Understanding the Differences.
Data combined with analytics is power for all
Alteryx, Data combined with analytics is power for all.
Tenable study finds that logging utilities inside Microsoft Azure Arc’s Jumpstart are exposed
Tenable Research has discovered that the Jumpstart environments for Microsoft’s Azure Arc do not properly use logging utilities common amongst …
Cash App fraud: 10 common scams to watch out for
Cash App fraud: 10 common scams to watch out for.
Over 200 Domains Impersonating Middle Eastern Postal Services
Over 200 Domains Impersonating Middle Eastern Postal Services: Group-IB Report.
A Good Security Strategy Against Ransomware is at the Heart of Digital Transformation
Veeam: A Good Security Strategy Against Ransomware is at the Heart of Digital Transformation.