By adopting a comprehensive cybersecurity strategy, financial institutions can effectively protect their systems, safeguard sensitive customer data, and maintain their …


By adopting a comprehensive cybersecurity strategy, financial institutions can effectively protect their systems, safeguard sensitive customer data, and maintain their …

After a Two-Year Investigation, Sophos X-Ops Discovers Unprecedented Sophistication in Scams That Trick Victims into Fake Investments.

Every day is Safer Internet Day. With data being the soul of businesses as well as virtual and vulnerable, it …

Expert instructors from SANS Institute will host specialized training in ICS security, as well as the latest threat hunting and incident response tactics in the Gulf Region.

Yealink has thanked Positive Technologies for discovering the critical vulnerability BDU:2024-00482 in its Yealink Meeting Server videoconferencing system.

In an era dominated by digital interactions, Data Privacy Day serves as a stark reminder of the vital need to …

Cloudflare has announced its 2023 Q4 DDoS report – which showed that DDoS attacks reached new heights in 2023. This …

Sophos Positioned as Leader in the 2023 Gartner Magic Quadrant for Endpoint Protection Platforms for the 14th Consecutive Time.

Google Cloud has released its annual Cybersecurity Forecast report for 2024, compiling forward-looking thoughts from security leaders and experts from …

Vectra AI, Inc., the leader in hybrid attack detection, investigation and response, has announced the release of its annual threat …

Qualys, Inc (NASDAQ: QLYS), has released new research from the Qualys Threat Research Unit (TRU), delving into some of the critical vulnerabilities …

Toni El Inati – RVP Sales META & CEE at Barracuda Networks, argues that VPNs have had their day and …

Tahawultech.com spoke to cybersecurity industry frontrunners to learn more about the pitfalls of online shopping and tips to shop safely …

Steven Kenny, Architect & Engineering Program Manager EMEA at Axis Communications, writes an exclusive opinion piece for Tahawultech.com on how …

ESET researchers have observed an alarming growth in deceptive Android loan apps which present themselves as legitimate personal loan services, …

New research finds a new levelling of physical and cyber battlefields, revealing a thin line between physical war and cyber (through hacktivism)

It’s the year of reckoning for the identity crisis: The decentralised identity movement goes mainstream in the age of AI

Those who embrace emerging technologies to drive innovation and strengthen their security posture whilst building policies and guardrails for compliant usage, are the ones who will flourish in 2024.

Establishing a paranoid but blame free culture that reports suspicious activity — as well as genuine mistakes — early and often helps ensure incidents (no matter how rare) are reported as soon as possible.

Senior leadership must be involved in cyber-risk governance to ensure that the companywide governance plan aligns with overall corporate objectives.