ThycoticCentrify is now Delinea, a Privileged Access Management Leader Providing Seamless Security for Modern, Hybrid Enterprises.

ThycoticCentrify is now Delinea, a Privileged Access Management Leader Providing Seamless Security for Modern, Hybrid Enterprises.
SentinelOne and Mimecast Integrate to Improve End-To-End Threat Protection for Enterprise Devices and Email.
Mandiant Expands SaaS Platform Capabilities.
Qualys Adds Advanced Remediation Capabilities to Minimise Vulnerability Risk.
Saaed Ahmad, Managing Director, Middle East and North Africa at Callsign, is pleading with businesses to place a greater emphasis …
Patrick Smith, CTO, EMEA at Pure Storage, has given his tech predictions for 2022, a year in which he believes …
CNME Editor Mark Forker is attending the inaugural LEAP 2022, which is being held in Riyadh this week – and …
Help AG Partners with Owl Cyber Defense, the Global Leader in Edge Security and Cross Domain Solutions.
Predictions for the Future of Broadband Networks.
Top 8 trends for the security industry in 2022.
Kaspersky’s new Women in Tech report – women in tech face lockdown barriers to career progression.
CNME Editor Mark Forker secured an exclusive interview with industry veteran Philip Andrews, Vice President and General Manager of RedHat …
January 28 is Data Privacy Day. Anita Joseph, Editor, Security Middle East, spoke to experts to find out why confidentiality …
Safe Security and Infosys Announce Strategic Collaboration to Bring Cutting Edge Risk Quantification Solutions to the Market.
Leon Ward, VP of Product Management at ThreatQuotient, tells Anita Joseph that data-driven automation provides an approach that is better …
Customer Engagement Plays a Key Role in KSA’s Booming Retail Sector.
With the 16th consecutive quarter of double-digit growth, Anand Eswaran joins as CEO to lead next phase of growth and scale the company.
New research reveals impact of cyber threats on digital transformation in Middle East.
Pure Storage Partners with Meta on AI Research SuperCluster (RSC).
Cybercriminals use new tactics to attack industrial organisations – all in a hunt for corporate credentials.