According to AccessData Group, the Middle East is fast becoming a prime target for cyber criminals, mostly because so many …
Pirate software market costs business $114bn, MEA market among largest
Pirated software is costing industry in excess of $114 billion, according to a new IDC survey commissioned by Microsoft. Though …
Eye of the storm
Experts recently pointed towards security as the main obstacle for adoption of all cloud types and claimed that cloud security …
Oracle releases emergency fix for Java vulnerabilities
Oracle released emergency patches for Java on Monday to address two critical vulnerabilities, one of which is actively being exploited …
Dell SonicWALL unveils next-gen firewall
Dell on Monday unveiled its SonicWALL SuperMassive 9000 Series next-generation firewall. The solution provides advanced threat protection at multi-gigabit speeds …
Experts slam ‘dangerously unprepared’ IT security managers
Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, …
FireEye launches new threat protection platform
Security company, FireEye, has announced a new threat protection platform designed to help enterprises deploy new security models to counter …
Secure everything, everywhere ..and that includes performance and productivity
Dell SonicWALL’s Head of Product Marketing, Florian Malecki, talks devices, data, and security. We love our devices. IDC is predicting …
McAfee acquires ValidEdge sandboxing tech
McAfee on Monday announced that it has acquired the ValidEdge anti-malware sandboxing technology from LynuxWorks in order to add a …
Stuxnet ‘dates back to 2005’
Researchers from Symantec have found and analysed a version of the Stuxnet cyber sabotage malware that predates previously discovered versions …
HP outlines Big Data Security strategy
HP on Monday unveiled its Big Data Security strategy, describing how combining the enterprise search and knowledge management resources from its Autonomy subsidiary …
Channels of profit
Times have never been better for security-focused channel partners. The fast changing threat landscape and the emergence of advanced threats …
Disabling Java on your Mac
With the news that some Apple, Facebook, and Twitter employees’ Macs were hacked, as well as Apple and Oracle’s subsequent software …
Google unveils touchscreen Chromebook Pixel
Google on Thursday unveiled the $1,299 touchscreen Chromebook Pixel, a pricey slab of hardware that runs Google’s Web-centric Chrome OS, but defies …
Three alternatives to Adobe Reader
Another day, another critical security exploit discovered for Adobe Reader. The PDF software’s near-ubiquitous presence has made it a big, fat, …
Adobe Reader exploit ‘part of cyber espionage operation’
The head of the malware analysis team at antivirus vendor Kaspersky said last week that a recently found exploit that …
Cyber security challenges in 2013
The security issues affecting businesses are similar around the world, writes Florian Malecki, Head of Product Marketing Manager –EMEA, Dell …
Blazing a new trail
Karl Driesen, VP EMEA, Palo Alto Networks
Malnets make the jump to mobile
Today’s mobile spam and phishing attacks will increasingly delivered by mobile malware networks, despite mobile device operating systems being more …
Are 8 Windows more shatterproof than 7?
So far, the evidence suggests Windows 8 has hardly been the gleaming success that Microsoft no doubt hoped it would …