Fortinet

The challenge of securing IoT

IoT security challenges include weak authentication and authorisation protocols, insecure software, firmware with hard-coded back doors, poorly designed connectivity and communications, and little to no configurability.

Cisco report: Classic attack vectors re-emerge

According to the Cisco 2017 Annual Cybersecurity Report (ACR), the security gaps in today’s organisations have led to a resurgence of “classic” attack vectors, such as adware and email spam, the latter at levels not seen since 2010.

UAE tops Middle East list for most employee data leaks

Digital Shadows has released its Compromised Credentials research paper which analysed the largest 1,000 companies listed on the Forbes Global 2000. The report revealed that the most affected country in the Middle East – with over 15,000 leaked credentials was the UAE.

Turning security inside out

Intel Security’s Raj Samani on his company’s commitment to help customers address the increasingly urgent need to shorten response time and simplified threat defence strategies.

Let’s encrypt and decrypt

Paul Nicholson, Director, Product Marketing, A10 Networks, discusses why organisations need a dedicated SSL inspection platform to eliminate potential blind spots in their respective cyber defences.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines