F5 Networks and Shape Security announced a definitive agreement under which F5 will acquire all issued and outstanding shares of the privately held Shape for a …
Trend Micro instrumental in Scan4You convictionTrend Micro has announced details of its close cooperation with the FBI to identify, arrest and bring to trial the individuals linked to the infamous Counter Antivirus (CAV) service Scan4You.0 3252
Oil and Gas industry should prioritise cybersecurity: Trend Micro
Trend Micro Incorporated, a global leader in cybersecurity solutions, has announced the findings of new research on the cyber risks …
Gartner Security & Risk Management Summit: cybersecurity threats and solutions
Tahawultech.com reports back from Gartner Security & Risk Management Summit, where Gartner experts and IT leaders shared the latest cybersecurity …
Data security biggest digital transformation challenge: GBM study
Gulf Business Machines (GBM) has revealed the findings of the 8th edition of its annual cybersecurity study. This year’s survey …
Battling email fraud: the power of people-centric security
Business email attacks are particularly pernicious as, when convincing enough, they can get behind even the best security defences incredibly quickly.
How to address the challenges of insider risks
While external cyber risks are devastating there is a growing number of organisations are concerned about security risks resulting from insiders.
Digital landscape or digital riskscape?: Malware attacks on the rise in UAE
As businesses rush to embrace digital transformation in the Industry 4.0 era, recent research by international cybersecurity experts shows that while cyberspace can deliver superior efficiency and productivity benefits, it can also put businesses at severe risk.
Global security firm unveils playbook for defending against ransomware
Sophos has published How Ransomware Attacks, a playbook for defenders that explains how ransomware variants attack and impact victims.
Google launches ‘App Defense Alliance’ to fight bad apps
Google is teaming up with three major security companies to stop Potentially Harmful Applications (PHAs) before they reach users’ devices …
Human vulnerabilities cause the most devastating cybersecurity breaches: study
A majority targeted cyber-attacks are successful because of human error, according to the latest study by cybersecurity and compliance company Proofpoint.