Senior leadership must be involved in cyber-risk governance to ensure that the companywide governance plan aligns with overall corporate objectives.
New Trellix report highlights new developments in Malware & malicious GenAI
Trellix report highlights new programming languages in malware development, adoption of malicious GenAI, and acceleration of geopolitical threat activity.
Threat predictions for 2024: Attackers have more “easy” buttons than ever
Threat Predictions for 2024: Chained AI and CaaS Operations Give Attackers More “Easy” Buttons Than Ever.
Retail organisations attacked by ransomware increasingly unable to halt an attack in progress
Only 26% of Surveyed Organisations Stopped Cybercriminals from Encrypting Their Data in a Ransomware Attack. This Is the Lowest Rate of Disruption in 3 Years.
SANS Institute to fortify cybersecurity ecosystems in the Middle East with Gulf Region 2023
With 13 immersive courses and hands-on training from industry experts, professionals can look forward to the opportunity to learn and collaborate with the global cybersecurity community.
5 ways SMBs can protect themselves from cybersecurity breaches
Hackers will also exploit our trust to facilitate a cybersecurity breach. This could be something as simple as an employee clicking an untrustworthy link or sharing sensitive information with a hacker posing as someone else.
Infor announces new developer portal and program
Program serves as on-ramp for launching solutions on Infor Marketplace; providing choices and innovation to Infor customers.
Positive Technologies promotes AI and ML with 8 new partnerships
Positive Technologies has agreed on partnership with eight providers of cybersecurity services and solutions to develop cooperation in the region for the promotion of modern products and exchanging experience in the field of cybersecurity.
SANS Institute to Fortify Cybersecurity Ecosystems in Middle East with Gulf Region 2023
With 13 immersive courses and hands-on training from industry experts, professionals can look forward to the opportunity to learn and …
ESET Research: Infamous IoT botnet Mozi taken down via a kill switch
ESET Research recently observed the sudden demise of one of the most prolific Internet of Things (IoT) botnets, named Mozi, …
Preventive Cyber Defence
Maher Jadallah, Senior Director Middle East & North Africa, Tenable details their plans to empower organisations with comprehensive exposure management across an ever-expanding attack surface.
Veritas Director weighs in on GITEX 2023 participation
Ramzi Itani, Regional Director, Middle East at Veritas Technologies, discusses the opportunities and points of interest presented by GITEX Global 2023.
Resecurity introduces digital identity protection in UAE
Resecurity is dedicated to safeguarding citizens and businesses in the UAE from cyber threats.
Tenable recognised as a leader in OT Security in Latest report
Tenable, recently announced it has been named a ‘Leader’ in the GigaOm Radar for Operational Technology (OT) Security.
Veritas outlines the best practices for CISOs looking to balance predictive text technology with security
Christos Tulumba, Chief Information Security Officer at Veritas Technologies, has penned a comprehensive op-ed designed to provide CISO’s with a …
Cisco secure application delivers business risk observability
Built on Cisco’s Full-Stack Observability Platform, Cisco Secure Application provides organisations with intelligent business risk insights to help them better prioritise issues, respond in real-time to revenue-impacting security risks and reduce overall organisational risk profiles.
Exclusive interview: Rakesh Ragudharan, Vice President, Strategic Initiatives, Bahwan CyberTek
Anita Joseph spoke to Rakesh Ragudharan, Vice President, Strategic Initiatives, Bahwan CyberTek, on how a hybrid security approach blends the …
Tenable integrates Generative AI capabilities with the launch of ExposureAI
Industry’s largest repository of threat, vulnerability and asset data enables unprecedented intelligence to quickly identify and mitigate cyber risk.
5 signs your clients need a cybersecurity makeover
In today’s digital age, re-evaluating networks and cybersecurity operations is essential, particularly in the UAE, where the threat landscape is rapidly evolving.
Global Cybersecurity Threat Landscape Report Q2 2023
Positive Technologies: four out of five attacks targeted in nature.