César Cernuda, Global President of NetApp, delves into the transformative potential of AI, its critical dependence on data, and the ethical considerations we must navigate.
Pure Storage arming enterprises with new services in the ongoing fight against ransomware
Pure Storage, the IT pioneer that delivers the world’s most advanced data storage technology and services, has announced three new …
Lenovo partners up with Marmar Halim and FAD Luxury Fashion Institute
Lenovo collaborates with Marmar Halim and FAD Luxury Fashion Institute to bridge the gap between fashion and technology.
Arma Group embarks on a new digital transformation journey
Arma Group has enlisted the support of SAP SE to embark on a complete digital transformation to enhance its services for retailers, partners, employees and customers.
UK vertical farming company believes their technology can tackle global concerns on food security
CNME Editor Mark Forker secured an exclusive interview with Jamie Burrows, co-founder and CEO of Vertical Future, to learn more …
Google Cloud announce significant new collaboration with Saudi Pharmaceuticals giant
Google Cloud has today announced a collaboration with the Saudi Pharmaceutical Industries and Medical Appliances Corporation (SPIMACO) that involves one …
Introducing content disarm and reconstruction – the zero-trust rebel that frisks every file
Instead, let us consider technology that does not rely on detection but follows zero-trust principles and assumes all files are malicious. This method works by first verifying a file’s type and identifying any embedded content. It removes any content it considers to be potentially malicious and reconstructs the file using only legitimate components. We call this sanitisation method “content disarm and reconstruction”, or CDR.
NETSCOUT’s DDoS Threat Intelligence Report reveals alarming surge in direct-path attacks
NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT), a leading provider of performance management, cybersecurity, and DDoS protection solutions, has released findings from …
Veggitech reveals the first ever Saffron farm in the UAE
Veggitech, a pioneer in agritech, unveiled the first Saffron farm ever in the UAE and the largest in the MENA …
A10 Networks announces Harmony Controller as-a-Service
The A10 Harmony Controller provides centralised management and analytics for A10 secure application services. Network admins for enterprises and service …
A10 Harmony Controller as-a-service provides elastic network capacity
New Release of A10 Harmony Controller as-a-Service Provides Simpler Elastic Network Capacity.
Opinion: Cybersecurity myths that are harming your business
By Dan Woods, Global Head of Intelligence at F5 In the past two years, the world has been shocked economically, …
NTS, Intertec Systems, Konvexe, Block Armour, and Blockchain Worx announce strategic partnership
New Technology Systems LLC, Intertec Systems, Konvexe, Block Armour, and Blockchain Worx announce strategic partnership to expand blockchain-based enterprise solutions in the middle east region.
Conti Gang Encrypts Karma’s Extortion Notes in Dual Ransomware Attack
Conti Gang Encrypts Karma’s Extortion Notes in Dual Ransomware Attack, Sophos Research Reveals.
BlueStacks Launches Fastest Ever Version with ARM Support
BlueStacks Launches Fastest Ever Version with ARM Support. BlueStacks 5 Beta uses 40% less memory than BlueStacks 4. Has advanced features like App containers, FPS lock, Long-flight, and Eco mode.
See and secure all connected devices with Armis
Armis VP outlines the importance of seeing and securing all connected devices to keep your business and users secure.
Qualys extends partnership with Armor include compliance and monitoring of public clouds
Qualys CloudView App to power Armor Anywhere Cloud Security Posture Management Capabilities
Sophos deconstructs Dharma ransomware-as-a-service attacks
Sophos has published, “Color by Numbers: Inside a Dharma Ransomware-as-a-Service (RaaS) Attack,” which provides the first in-depth look at an automated attack script and toolset created by the ransomware operators.
Crypto-ransomware in action: a closer look at the WastedLocker hijack of Garmin
Garmin was attacked by the Trojan WastedLocker—ransomware that has become noticeably more active since the first half of this year.
CyberKnight inks Middle East partnership with Armis
CyberKnight has partnered with Armis to address challenges related to prevention, detection, and mitigation of IoT, OT and ICS threats faced by enterprise and government customers in the Middle East.