McAfee has released its McAfee Labs Threats Report: April 2017, which details the challenges facing threat intelligence sharing efforts, probes the architecture …

McAfee has released its McAfee Labs Threats Report: April 2017, which details the challenges facing threat intelligence sharing efforts, probes the architecture …
Symantec has recently tied the CIA hacking tools leaked by WikiLeaks last month to a cyber espionage group responsible for at least 40 hacks in 16 countries.
Rishi Bhargava, Co-founder and VP Marketing, Demisto, gives us a lowdown on the latest threat looming in the cyberspace.
The growing importance of cyber security in Saudi Arabia was highlighted at the very start of this year when an …
WikiLeaks has recently released files that allegedly show how the CIA masked its malware attacks.
Abu Dhabi Police have arrested four hackers who stole more than AED1 million from consumers’ accounts by installing skimmer devices …
What are the top cybercrime activities businesses need to watch out for, and what can be done to combat them?
Sophos has released the findings of a regional study indicating that majority of organisations in Middle East and Africa (MEA) are recognising the benefits of integrated security.
Digital Shadows has announced new enhancements to its SearchLight digital risk management service helping organisations detect and respond to mobile application threats against their employees and consumers.
A10 Networks decrypts and Fidelis Network analyses all network traffic across all ports and protocols, and then reassembles it in real time using session-based approach.
While DNS infrastructure is inherently a vulnerable component for organisations, effective internal DNS security solutions can turn it into a great asset for securing an organisation’s networks and data.
IoT security challenges include weak authentication and authorisation protocols, insecure software, firmware with hard-coded back doors, poorly designed connectivity and communications, and little to no configurability.
Help AG has signed a reseller agreement with Menlo Security to provide consulting, implementation and support services for the vendor’s …
As mobile devices continue to proliferate, mobile security is becoming increasingly difficult to manage. Every mobile device, whether it is …
In the last year, we’ve all heard of the Mirai malware, but did you know that Mirai is Japanese …
Under the terms of the agreement, Ingram Micro will help to accelerate the rapid growth that PhishMe has achieved across META (Middle East, Turkey and Africa).
Intel Security’s latest study shed light on to how consumers are being tempted by the efficiency and entertainment of connected devices, revealing the average person now spends 38 percent of their time at home online.
Sophos has launched Sophos Mobile 7, the latest version of its Enterprise Mobility Management (EMM) solution.
Mimecast has introduced the latest capability of its Targeted Threat Protection service, Internal Email Protect, a cloud-based security service providing threat capabilities for internally generated email.
Intel Security has outlined a new, unifying approach for the cybersecurity industry to eliminate fragmentation through updated integrated solutions, new cross-industry partnerships and product integrations within the Intel Security Innovation Alliance and Cyber Threat Alliance (CTA).