Organisations in the Middle East and North Africa (MENA) region are facing immense challenges brought by evolving cyber threats that are moving beyond attacks such as phishing, denial-of-service, and credential compromise.
“Superthreats” to become more prevalent next year, warns McAfee
The McAfee Labs 2019 Threats Predictions Report, identifies rising trends and how they are predicted to change the cyber threat landscape in 2019.
Fortinet announces 2019 threat predictions
Fortinet has today unveiled predictions from the FortiGuard Labs team about the threat landscape for 2019 and beyond. These predictions …
Z Services, TitanHQ expand regional cybersecurity technology partnership
Z Services, a cloud-based cybersecurity solutions provider in the MENA region, and TitanHQ, a company focused on web filtering, email …
Demand for more “versatile” malware on the rise: study
International demand for multifunctional malware that are flexible enough to perform almost any task are on the rise, according to the latest research by Kaspersky Lab.
Symantec offers free checkup for VPNFilter menace on routers
Symantec has announced VPNFilter Check, a free online tool designed to help individuals and organisations quickly and simply determine if a router may be impacted by VPNFilter malware.
Something Phishy: how to identify and avoid phishing scams
Phishing is one of the most common attack vectors for hackers who exploit end-user behaviour as the weakest link in an organisations cyber-defense.
Security at your fingertips: how to craft a strong password
There have been predictions that password use would decline thanks to alternative methods of authentication, yet the need to register for countless websites and online services means that we are actually employing more of them than ever.
How enterprises can get a handle on data
Michel Nader, Regional Director, Data Protection Solutions, Middle East, Turkey and Africa (META Region), Dell EMC, shares insights on the critical strategies needed for protecting data.
Intelligent security is key to fight sophisticated threats
Intelligent security is increasingly becoming vital as GCC CISOs continue to battle against increasingly sophisticated threats, according to experts.
When to use blockchain for security purposes
Blockchain has the potential to improve encryption and authentication, and that could be good news for IoT security and DDoS protection.
6 ways hackers exploit machine learning tools
Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.
What’s happening on the Internet?
Our network, which encircles the entire globe, carries more than 28% of all Internet routes. As a result, we’re in …
Using IoT devices to launch attacks from within
The number of IP-enabled IoT devices has increased dramatically in the last several years and according to Gartner, it is predicted …
Fortinet: Self-learning “Swarm” cyber-attacks to be expected in 2018
Fortinet has unveiled predictions from the Fortinet FortiGuard Labs global research team about the threat landscape for 2018.
Beyond the appliance: Leveraging threat intelligence for cybersecurity
What underpins the security appliances is invisible, but plays a pivotal role in ensuring that those boxes block the threats that imperil your business.
How enterprises can fend off DDoS attacks
Though distributed denial of service attacks have been around more than two decades, recently we have seen a spate of DDoS attacks that have increased in complexity and variability.
Identifying partners’ role in securing IoT
Consulting firm BCG predicts $267B will be spent on IoT technologies, products, and services by 2020. This means intensifying IoT-enabled …
Poor cybersecurity hygiene, risky apps enable destructive attacks
Fortinet has announced the findings of its latest Global Threat Landscape Report, which revealed that poor cybersecurity hygiene and risky application usage enables destructive worm-like attacks to take advantage of hot exploits at record speed.
8 top cyber-attack maps and how to use them
Most of the cyber-attack maps online today are just ‘eye candy,’ but there are some creative ways they can be used.