The costs associated with cyberattacks on the financial sector are rising as organizations face increasingly sophisticated threats. New research by Kaspersky …

The costs associated with cyberattacks on the financial sector are rising as organizations face increasingly sophisticated threats. New research by Kaspersky …
How to survive a ransomware attack unscathed
SCOPE Middle East has announced that it is now a member of the HID Advantage Partner Program, a loyalty-based programme which advances a partner’s relationship with HID Global.
DDoS attacks are vastly bigger now. Here is what you need to do to protect yourself and your network.
Mobile is the new endpoint in IT. Getting the job done using mobile devices as you move around has brought in its wake many benefits and improved productivity to organisations in the Middle East. Here is how to protect mobile devices and data.
There has been a dramatic increase in cyberattacks on critical infrastructure but regional organisations remain unprepared.
John McCarthy, who coined the term, defined Artificial Intelligence as ‘the science and engineering of making intelligent machines.’ Recently, intelligent machines – their creators, specifically – have taken leaps and bounds when it comes to meeting humans as equals in terms of processing power and the ability to make informed decisions.
Westcon-Comstor is flaunting a range of its security services in its third outing at GISEC. Chief among them are its logistics, cloud and flexible finance solutions.
These days, the threat landscape for most companies is massive. But while there is a litany of outside threats that their security teams need to worry about, there is often an even greater danger much closer to home.
Advancements in attack evasion techniques are making new threats extremely difficult to detect. To keep up, a new security model that uses a different approach to the traditional “evidence of compromise” process is needed.
Software AG has announced the appointment of Ghassan Darri as Alliance and Channel Director for the Middle East and Turkey to further accelerate the adoption of its Digital Business Platform and bolster its growth initiatives.
According to recent reports, files and tools owned by the Hacking Team that has been leaked previously has now been repurposed by a cyber-espionage group targeting luxury hotels.
A cyber espionage group has targeted high-profile technology, Internet, commodities and pharmaceutical companies in the US, Europe and Canada, reports Symantec.
Companies can spend untold funds on the latest security software, keep their firewalls and security infrastructure up-to-date, monitor networks, and employ the highest level of IT talent all in the name of security. However, it can all be rendered useless by one simple thing – employees choosing to ignore basic regulations.
The rapid development of Internet access throughout Africa has not been accompanied by an equivalent increase in awareness of security …
Amjad Fathi Al-Omar, General Manager, Sariya IT, reveals growth strategy and channel plans for the year.
A cyber-espionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia.
Debating political issues, promoting free speech, and supporting human rights, the illegal cyber activities of hacktivists divide opinion. Are they criminals like any other, or are their cases of their work justifying their underhand means?
2014 has already gone down in history as the year of the data breach. As we move into the new year, what have we learned from our past that will aid us in the futures.
Data released by cloud storage service iDrive suggests that iPhone and Android users differ in terms of security and privacy habits as well as many others.