Infoblox Inc., has announced its participation at Gulf Information Security Expo & Conference (GISEC) 2015.

Securing the IoT stakes
Philippe Roggeband, Business Development Manager, Cisco Security Architecture, discusses the need for thorough security measures when it comes to the Internet of Things.

’65 percent’ of malware campaign aimed at ME
Two new malware campaigns have been spotted in the Middle East, according to reports released this week, one targeting energy companies and the other going after political targets in Lebanon.

Palo Alto discovers widespread Android vulnerability
Palo Alto Networks has revealed details of a widespread vulnerability in Google’s Android mobile operating system that allows attackers to hijack the installation of a seemingly safe application – Android Package File (APK) – on user devices, replacing it with an app of the attacker’s choice.

Kaspersky: Cyber-espionage more sophisticated
State sponsored malware is becoming increasingly sophisticated according to a report released by security vendor, Kaspersky Labs. According to a company statement, this new trend was confirmed during analysis of the EquationDrug cyber-espionage platform, the main espionage platform developed by the Equation Group.

Snowden docs show CIA Apple hack attempts
Researchers sponsored by the U.S. government have reportedly tried to defeat the encryption and security of Apple devices for years.
Bit9 + Carbon Black signs Microsoft endpoint deal
Bit9 + Carbon Black has announced a partnership with Microsoft to integrate some of the company’s endpoint solutions.

‘Incredibly advanced’ hackers hit ME infrastructure
A cyber-espionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia.

Cyber subversives
Debating political issues, promoting free speech, and supporting human rights, the illegal cyber activities of hacktivists divide opinion. Are they criminals like any other, or are their cases of their work justifying their underhand means?

Dubious cause, dubious outcome
As Chief Information Security Officer of automated threat response firm CSG Invotas, Peter Clay always has his hands full. He tells CNME about his pain points, processes that can ease the burden on IT security, and the shortcomings that the industry faces.

Untapped info
In association with CNME, research firm Gartner and HP hosted a roundtable packed with IT decision-makers to discuss the prospects of Big Data solutions in the Middle East.

MIT Director: Dubai a global pacesetter
The Director of the Massachusetts Institute of Technology’s Centre for Digital Business today discussed the pervasive impact of the digital revolution on societies and economies across the world, highlighting Dubai as a leader in the field.
Profitable connections
Internet of Things unlocks huge opportunities for the regional channel partners. Reseller ME finds out how they can optimise this technology to remain profitable.

The road to 5G
Is 5G a long way away? A lack of unifying standards, complex technology and spectrum auctions, alongside a lack of necessity will only see 5G go mainstream by 2023, but there is already a lot of hype around the technology.

UK PM Cameron raises encryption alarm
Great Britain Prime Minister David Cameron has hinted that a future Conservative Government would challenge the developers of WhatsApp and SnapChat if they continue to use the sort of encryption that makes security service eavesdropping difficult.

Lessons learned
2014 has already gone down in history as the year of the data breach. As we move into the new year, what have we learned from our past that will aid us in the futures.

Future fears
The threat intelligence market, and the world of IT security more generally, may be the fastest growing and changing aspects of the technology industry. The gap between those in the know and those still desperately trying to catch up in terms of security know-how is growing ever wider.

Iranian hackers hit ME infrastructure for 2 years
For the past two years, a team of Iranian hackers has compromised computers and networks belonging to over 50 organisations from 16 countries, according to research from IT security firm Cylance.

Stuxnet hit nuclear site via ‘trusted business partners’
Stuxnet, the powerful malware that wormed its way in and hobbled Iran’s uranium enrichment efforts, infiltrated the secure networks of the nuclear program via trusted partners, newly public information reveals.

Chink in the armour
IT security professionals have to find frailties in external security systems before cybercriminals – who can attack at an increasingly fast pace – seek to exploit them. With that in mind, it is paramount that security professionals are aware of common weak points.