Mobile is the new endpoint in IT. Getting the job done using mobile devices as you move around has brought in its wake many benefits and improved productivity to organisations in the Middle East. Here is how to protect mobile devices and data.

Under siege
There has been a dramatic increase in cyberattacks on critical infrastructure but regional organisations remain unprepared.

Future perfect
John McCarthy, who coined the term, defined Artificial Intelligence as ‘the science and engineering of making intelligent machines.’ Recently, intelligent machines – their creators, specifically – have taken leaps and bounds when it comes to meeting humans as equals in terms of processing power and the ability to make informed decisions.
Three’s the magic number
Westcon-Comstor is flaunting a range of its security services in its third outing at GISEC. Chief among them are its logistics, cloud and flexible finance solutions.

Inside job
These days, the threat landscape for most companies is massive. But while there is a litany of outside threats that their security teams need to worry about, there is often an even greater danger much closer to home.

The six pillars of next-gen endpoint protection
Advancements in attack evasion techniques are making new threats extremely difficult to detect. To keep up, a new security model that uses a different approach to the traditional “evidence of compromise” process is needed.
Software AG appoints new Alliance and Channel Director
Software AG has announced the appointment of Ghassan Darri as Alliance and Channel Director for the Middle East and Turkey to further accelerate the adoption of its Digital Business Platform and bolster its growth initiatives.

Hacking Team zero-day used in new Darkhotel attacks
According to recent reports, files and tools owned by the Hacking Team that has been leaked previously has now been repurposed by a cyber-espionage group targeting luxury hotels.

Symantec uncovers Morpho hacking activities
A cyber espionage group has targeted high-profile technology, Internet, commodities and pharmaceutical companies in the US, Europe and Canada, reports Symantec.

Bad behaviour
Companies can spend untold funds on the latest security software, keep their firewalls and security infrastructure up-to-date, monitor networks, and employ the highest level of IT talent all in the name of security. However, it can all be rendered useless by one simple thing – employees choosing to ignore basic regulations.

Faster Internet access means more cyberattacks for Africa
The rapid development of Internet access throughout Africa has not been accompanied by an equivalent increase in awareness of security …
The value quotient
Amjad Fathi Al-Omar, General Manager, Sariya IT, reveals growth strategy and channel plans for the year.

‘Incredibly advanced’ hackers hit ME infrastructure
A cyber-espionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia.

Cyber subversives
Debating political issues, promoting free speech, and supporting human rights, the illegal cyber activities of hacktivists divide opinion. Are they criminals like any other, or are their cases of their work justifying their underhand means?

Lessons learned
2014 has already gone down in history as the year of the data breach. As we move into the new year, what have we learned from our past that will aid us in the futures.

iOS users ‘more security conscious’ than Android base
Data released by cloud storage service iDrive suggests that iPhone and Android users differ in terms of security and privacy habits as well as many others.

Stuxnet hit nuclear site via ‘trusted business partners’
Stuxnet, the powerful malware that wormed its way in and hobbled Iran’s uranium enrichment efforts, infiltrated the secure networks of the nuclear program via trusted partners, newly public information reveals.

Hacker headspace
With cybercrime an ever-present danger, hackers around the world attack user data for financial and political gain. But they are not all bad. CNME takes a look at the mindset of hackers good and evil, and how they constantly ask questions of governments and top companies.

A safe bet
The OS wars are nothing new. Every user has a laundry list of reasons why their operating system is king. One of the key points in determining which OS reigns supreme is security. CNME investigates the security successes and pitfalls of the most commonly used operating systems.

Malicious mobility
From paying bills on our smartphones to banking on our tablets, we are living more and more of our lives on our mobile devices. However, with all of this agility comes a measure of concern.