Alain Penel, Regional Vice President, Middle East, Fortinet, discusses 10 steps for protecting your organisation from ransomware.
Evolving rules of security
Harish Chib, Vice President Middle East and Africa, Sophos, shares insights on the way channel business in network and IT security is set to develop in the era of third platform technologies.
Future perfect
John McCarthy, who coined the term, defined Artificial Intelligence as ‘the science and engineering of making intelligent machines.’ Recently, intelligent machines – their creators, specifically – have taken leaps and bounds when it comes to meeting humans as equals in terms of processing power and the ability to make informed decisions.
Resilient networks
Adrian Pickering, Vice President, Middle East and Africa, Juniper Networks, gives us a lowdown on their participation at this year’s GISEC and shares his thoughts about the current situation of the security landscape.
Modern defence
Zulfikar Ramzan, CTO, RSA Security, discusses how organisations should change their mind-sets to adapt to the evolving threat landscape and the value-add security can bring to businesses.
Polycom introduces new collaboration software solution
The RealPresence Clariti, according to the company, is a simple and cloud-ready collaboration infrastructure software that can support a broad selection of collaboration ecosystems and a streamlined licensing model.
Eliminating security blind spots
With attackers preying on the security gaps created by encrypted traffic, there are various common network traffic inspection errors being made by organisations today. We bring you a few common issues occurring within networks and how they can be remedied.
New releases from Dell world forum
Though Dell’s stand at GITEX is seeing a great deal of foot fall this week, it is nothing in comparison to the annual Dell Word Forum currently being held in Austin, Texas.
Losing IT
Highly publicised events have demonstrated that it is now more difficult than ever to protect an organisation’s internal data. Advances in technology and productivity tools have made collaboration in the workplace easier, while also creating new vectors for data to leave the organisation.
Cyber vigilance
Radwan Moussalli, Senior Vice President – Middle East, Central Asia and Africa, Tata Communications, talks about the emerging security concerns in the digital age and how organisations can tackle these threats.
Fortinet to share insights on cyber security at GISEC 2015
Fortinet is participating at the Gulf Information Security Expo & Conference (GISEC), the Middle East’s essential IT Security Knowledge Platform, …
Gigamon unveils Software Defined Visibility
The new Software Defined Visibility allows the automation of network traffic visibility for rapid response to security threats.
Winning the IoT tug of war
In the next few years, businesses may live or die by IoT. Handle it well and your company thrives. Mess …
Advanced Threat Protection at GISEC 2015
Fortinet a global leader in high-performance cyber security – today announced that it will be present at the Gulf Information Security Expo & Conference (GISEC), the Middle East’s essential IT Security Knowledge Platform, taking place from April 26 to 28, 2015 at the Dubai World Trade and Convention Center.
FireEye aims for a cultural shift around advanced security
FireEye has announced two solutions that aim to help organisations scale their defense strategies. FireEye as a Service is on-demand …
Fortinet hosts GCC workshops
Fortinet kicked off its ‘Power to Learn’ pre-sales partner training sessions across the GCC region Monday in Dubai.
Confronting malware intelligently
Brian Kenyon, Chief Technology Strategist, McAfee, a part of Intel Security, follows a “define-freeze-fix” approach to eradicate malware, and is confident that his company is well positioned to deal with today’s ever-evolving threat landscape.
Palo Alto uncovers new source of cyberthreats
Palo Alto Networks has revealed that cyber criminals in Nigeria have evolved common malware campaigns to infiltrate businesses that have …
Gartner names top 10 2014 IT security technologies
Gartner has highlighted its top 10 technologies for information security and their implications for security organisations in 2014.
Researchers publicly disclose vulnerabilities in Oracle Java Cloud Service
Researchers from Polish security firm Security Explorations, who found many Java vulnerabilities in the past, decided to publicly disclose the …