Tahawultech.com spoke to cybersecurity industry frontrunners to learn more about the pitfalls of online shopping and tips to shop safely …


Tahawultech.com spoke to cybersecurity industry frontrunners to learn more about the pitfalls of online shopping and tips to shop safely …

Steven Kenny, Architect & Engineering Program Manager EMEA at Axis Communications, writes an exclusive opinion piece for Tahawultech.com on how …

ESET researchers have observed an alarming growth in deceptive Android loan apps which present themselves as legitimate personal loan services, …

New research finds a new levelling of physical and cyber battlefields, revealing a thin line between physical war and cyber (through hacktivism)

It’s the year of reckoning for the identity crisis: The decentralised identity movement goes mainstream in the age of AI

Those who embrace emerging technologies to drive innovation and strengthen their security posture whilst building policies and guardrails for compliant usage, are the ones who will flourish in 2024.

Establishing a paranoid but blame free culture that reports suspicious activity — as well as genuine mistakes — early and often helps ensure incidents (no matter how rare) are reported as soon as possible.

Senior leadership must be involved in cyber-risk governance to ensure that the companywide governance plan aligns with overall corporate objectives.

Trellix report highlights new programming languages in malware development, adoption of malicious GenAI, and acceleration of geopolitical threat activity.

Threat Predictions for 2024: Chained AI and CaaS Operations Give Attackers More “Easy” Buttons Than Ever.

Only 26% of Surveyed Organisations Stopped Cybercriminals from Encrypting Their Data in a Ransomware Attack. This Is the Lowest Rate of Disruption in 3 Years.

With 13 immersive courses and hands-on training from industry experts, professionals can look forward to the opportunity to learn and collaborate with the global cybersecurity community.

Hackers will also exploit our trust to facilitate a cybersecurity breach. This could be something as simple as an employee clicking an untrustworthy link or sharing sensitive information with a hacker posing as someone else.

Program serves as on-ramp for launching solutions on Infor Marketplace; providing choices and innovation to Infor customers.

Positive Technologies has agreed on partnership with eight providers of cybersecurity services and solutions to develop cooperation in the region for the promotion of modern products and exchanging experience in the field of cybersecurity.

With 13 immersive courses and hands-on training from industry experts, professionals can look forward to the opportunity to learn and …

ESET Research recently observed the sudden demise of one of the most prolific Internet of Things (IoT) botnets, named Mozi, …

Maher Jadallah, Senior Director Middle East & North Africa, Tenable details their plans to empower organisations with comprehensive exposure management across an ever-expanding attack surface.

Ramzi Itani, Regional Director, Middle East at Veritas Technologies, discusses the opportunities and points of interest presented by GITEX Global 2023.

Resecurity is dedicated to safeguarding citizens and businesses in the UAE from cyber threats.
GET TAHAWULTECH.COM IN YOUR INBOX