From bullets to bits

In addition to dealing with cybercriminals and hacktivists, enterprise security managers must pay increasing attention to avoid becoming collateral to nation-state cyber-warfare. Do recent high profile attacks on the region indicate that Middle Eastern businesses are at greater risk of attack, and what damage can cyber warfare inflict?

Epicor signs Kuwaiti Zenith as VAR

Epicor Software has announced that Kuwaiti firm Zenith Business Solutions is the latest value-added reseller to join its Inspired Partner Network in the Middle East.

Hacker headspace

With cybercrime an ever-present danger, hackers around the world attack user data for financial and political gain. But they are not all bad. CNME takes a look at the mindset of hackers good and evil, and how they constantly ask questions of governments and top companies.

A safe bet

The OS wars are nothing new. Every user has a laundry list of reasons why their operating system is king. One of the key points in determining which OS reigns supreme is security. CNME investigates the security successes and pitfalls of the most commonly used operating systems.

Malicious mobility

From paying bills on our smartphones to banking on our tablets, we are living more and more of our lives on our mobile devices. However, with all of this agility comes a measure of concern.

‘Keep calm and save the world’

From April 20-24th, experts from Kaspersky Lab met with leading media in the region at the Kaspersky Lab Security Analyst Summit for the Middle East, Turkey and Africa held in Budapest, Hungary.

Virtual lock down

Virtualisation has made the data centre a more flexible and agile place. However, the trade-off in this software-defined shift is a measure of complexity when it comes to protecting our data. Enterprises must reconsider their protection strategy to reflect the new, virtualised world.

State secrets

What do Middle East governments need when it comes to security, and are newly formed government entities set to revolutionise the way that states think about security?

Prevention is better than cure

With security so high on the agenda, businesses are doing everything they can to safeguard their networks from cyber-criminals keen to capitalise on software exploits. But do businesses pay enough attention to software updates when there are hundreds of other issues to address?

FireEye: Cyber warfare defined by espionage and proxy conflicts

The world is still in the foothills of the cyberwar era but already online confrontation is being defined by an unstable and possibly dangerous mixture of proxy conflicts and old-fashioned espionage, mixed with lower-level digital activism, security firm FireEye has said.

Through the looking glass

And it was all going so well. As vendors began to build more comprehensive cloud-based product roadmaps, Middle Eastern users were beginning to see just how cloud services can streamline their businesses. According to a Gartner report from earlier in the year, cloud adoption was due to grow monumentally in the region up to 2016. This was largely due to issues surrounding security and compliance being ironed out.

The Way Forward

When it comes to security, it seems everyone’s in a state of perpetual panic. Whether it’s mobile malware, BYOD or hacktivism, over the course of 2013 the issue of protecting valuable information and resisting attack has inspired a dizzying and persistent challenge.

Dark skies ahead

Can the big cloud vendors work around the allegations of NSA surveillance, or is there a gloomy outlook for cloud in the region?

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines