Infoblox is using GITEX Technology Week to highlight its ‘holistic, end-to-end’ DNS security and ‘defense against the widest range of DNS-based attacks such as volumetric, exploits, and DNS hijacking attacks.’

Infoblox is using GITEX Technology Week to highlight its ‘holistic, end-to-end’ DNS security and ‘defense against the widest range of DNS-based attacks such as volumetric, exploits, and DNS hijacking attacks.’
During GITEX Technology Week, Brocade will be showcasing its networking technologies aimed at helping organisations in the Middle East transition to the New IP.
Encode, the cyber threat management company, has announced that it will be demonstrating its latest innovations in security analytics, response orchestration and cyber security operations and intelligence at GITEX Technology Week.
Infoblox has announced that it will demonstrate its latest offerings in DNS, DHCP, and IP Address Management (DDI), secure Domain Name System (DNS), cloud network automation and global server load balancing (GSLB) technologies at GITEX.
Advancements in attack evasion techniques are making new threats extremely difficult to detect. To keep up, a new security model that uses a different approach to the traditional “evidence of compromise” process is needed.
ISIT and the Storage Networking Industry Association of Europe (SNIA Europe), has announced that the pioneering edition of the ‘SNIA Middle East Academy,’ has concluded on a high-note.
Cisco has released its 2015 Midyear Security Report, which analyses threat intelligence and cybersecurity trends.
Sony John, Programme Manager for Telecoms and Media, IDC, discusses the diversification and transformation of the region’s telco market.
According to recent reports, files and tools owned by the Hacking Team that has been leaked previously has now been repurposed by a cyber-espionage group targeting luxury hotels.
Radwan Moussalli, Senior Vice President – Middle East, Central Asia and Africa, Tata Communications, talks about the emerging security concerns in the digital age and how organisations can tackle these threats.
ESET has announced its summer sales incentive programme for channel partners in the Middle East.
A cyber espionage group has targeted high-profile technology, Internet, commodities and pharmaceutical companies in the US, Europe and Canada, reports Symantec.
From New York to Nairobi, Paris to Perth and Beijing to Buenos Aires, Emirates is internationally acclaimed as one of the world’s elite airlines – and one of its most powerful brands. James Dartnell sat down with the company’s Senior Vice President of Group Finance, Michael Doersam, to discuss the powerful bond between the firm’s Finance and IT divisions.
Opportunities are changing in the Middle East, particularly when it comes to telecoms. Operators are moving to reinvent their services to cater to the growing SMB market.
Earlier in 2015 during a test, a prototype of an anti-APT solution developed by Kaspersky Lab detected signs of a complex targeted attack on its corporate network.
Network Function Virtualisation has the potential to profoundly change the way networks are built out and managed. Service providers hope to benefit from NFV by reducing start-up costs and the costs associated with network operations – both CAPEX and OPEX.
Johnny Karam, Regional Vice President, Middle East and Africa (MEA), Citrix, talks about the changing landscape of enterprise IT and the new models of security.
Cybercriminals have developed a Web-based attack tool to hijack routers on a large scale when users visit compromised websites or …
According to a new survey commissioned by F5 Networks, financial services organisations across EMEA are increasingly exposed to and concerned about the rising menace of web fraud threats.
It can be painful for an organisation to admit that their systems have been breached by a cyber-criminal. However, as cyber-attacks become more aggressive, it is essential that data on cyber-criminality is shared and analysed. It may be that sharing this data, even among competitors, will be the key to protecting our most sensitive information.