The results of the M-Trends 2023 report by Mandiant Inc., now a part of Google Cloud, have been announced and …


The results of the M-Trends 2023 report by Mandiant Inc., now a part of Google Cloud, have been announced and …

Increased deployment flexibility makes exposure management more accessible for customers.

The Most Common Root Causes of Attacks Were Unpatched Vulnerabilities and Compromised Credentials, While Ransomware Continues to Be the Most Common “End Game”.

With 60% of organisations taking more than four days to resolve cybersecurity issues, Unit 42’s Global Incident Response Service dramatically reduces time to remediate threats.

Over 56% of the core routers ESET purchased from secondary market vendors contained a treasure trove of sensitive data, including corporate credentials, VPN details, cryptographic keys, and more.

Kaspersky cybersecurity experts have discovered that chess players have been targeted by a range of different attacks from cybercriminals spreading malicious or unwanted mobile programs 一 even on Google Play 一 and Trojans and ransomware disguised as chess applications.

New innovations give teams the ability to deliver sub-second websites with integrated multi-layer security – all from one holistic platform.

A cybercriminal group used an exploit developed for different versions and builds of Windows OS, including Windows 11, and attempted to deploy the Nokoyawa ransomware.

The event offers high-quality training and insights for cybersecurity professionals in the region, which they can implement immediately to secure their organisations and advance their careers.

Saeed Ahmad, Managing Director Middle East and North Africa at Callsign, outlines what the metaverse means for our digital identities …

As the Middle East makes a concerted effort to grow its knowledge and skills-based economy, the role of data in driving innovation, transformation and success cannot be overstated.

Anoop Das, Enterprise Manager, Middle East at Mimecast tells Anita Joseph all about the company’s channel strategy, technology investments and …

Before downloading any software, check for digital signatures to ensure that the software is authentic and has not been tampered with.

It happens to all of us — that one precious photo or video that immortalised a special moment but doesn’t …

Cloud service providers now recognise their responsibility for security lies around their infrastructure and services provided for enterprises says Tamer Odeh, Regional Sales Director, from SentinelOne.

A prominent supplier of cloud-based IT, security, and compliance solutions, Qualys Inc. (NASDAQ: QLYS), has issued its 2023 TruRisk Research …

Veronica Martin caught up with Ashley Beck, Senior Industry Consultant – Global, Fraud & Security Intelligence Division at SAS, at …
Anita Joseph caught up with Werno Gevers, Regional Manager, Mimecast Middle East to learn more about Business Email Compromise and …

BeyondTrust, a global pioneer in intelligent identity and access security, has released the 2023 Microsoft Vulnerabilities Report. This study is …

Veronica Martin caught up with Maher Yamout, Senior Security Researcher at Kaspersky during GISEC 2023 to discuss the products and …