ThreatQuotient has announced its first appearance at the MENA Information Security Conference (ISC) in Riyadh this year.
New cybersecurity hub to enhance threat intelligence expertise in Middle East
The Cyber Hub will harness Thales’s local expertise and use established world-class methodologies as well as cyber training, simulation and threat intelligence.0 2698CrowdStrike named among leaders in Gartner Magic Quadrant for EPP
CrowdStrike has announced it has been positioned by Gartner in the Leaders quadrant of the “Magic Quadrant for Endpoint Protection Platforms.”
Mimecast to unveil new threat intelligence capabilities at GISEC
Mimecast has announced that GISEC attendees will be introduced to Mimecast’s newly unveiled Threat Centre.
Cyjax to launch Middle East operations
Cybersecurity services firm Cyjax has announced plans to launch its operations in the Middle East.
Kaspersky Lab uncovers new Windows zero-day exploit
Kaspersky Lab technologies have automatically detected a new exploited vulnerability in the Microsoft Windows OS kernel, the third consecutive zero-day exploit to be discovered in three months.
Actionable threat intelligence a priority for cyber resilience: report
If threat intelligence isn’t built into an organization’s comprehensive cyber resilience strategy, the organisation could be vulnerable to phishing attacks, malware incidents or worse, says an industry report.
Tata Communications strengthens cyber defence in Middle East
Tata Communications has unveiled an advanced cyber security response centre in Dubai.
Trend Micro empowers security teams with advanced analytics
Trend Micro has introduced advanced analytics capabilities for its network security solution, Deep Discovery.
6 ways hackers exploit machine learning tools
Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.
6 reasons why enterprises fail to focus on the real security threats
Computer defenders often spend time, money, and other resources on computer defences that don’t stop the biggest threats to their environment. What is causing this lack of focus in putting the right defences in the right places in the right amounts against the right threats?