CATEGORIES
Categories
Why Digital Transformation Calls For Increased Visibility
Sometimes it is difficult to see everything that affects us.
Riding The Cloud
Nicolai Solling, CTO, Help Ag, Shares Insights Into How Regional Organisations Can Develop A Strategic Approach To Securing Multi-cloud Environments.
The Talent Crunch
Sunil Varkey, Cto And Strategist, Emerging Region, Symantec, Sheds Light On How The Current Skills Gap Is Taking Its Toll On Security.
Employees: The Champions Of A Strong Cybersecurity Culture
Let’s face it, employees don’t care about security awareness training.
How To Prevent Data Manipulation Attacks
Conventional wisdom says that once an attacker is in the system, moving laterally from network to network, the damage is already done.
The Power Of One
HUSNI HAMMOUD, MANAGING DIRECTOR FOR MIDDLE EAST, CEE AND TURKEY AT MIDIS GROUP HAS ENJOYED A SHARP TRAJECTORY OF SUCCESS IN HIS CAREER AND HAS PLAYED A KEY ROLE IN SUCCESSFULLY LEADING THE BUSINESS GROWTH OF MULTIPLE IT OPERATIONS AND CYBERSECURITY VENDORS UNDER THE COMPANY’S PORTFOLIO.
Global Meets Local
IN HIS MOST RECENT VISIT TO DUBAI, 2CRSI FOUNDER AND CEO ALAIN WILMOUTH SAT DOWN WITH SECURITY ADVISOR ME TO DISCUSS THE COMPANY’S VISION TO BRING GLOBAL INNOVATIONS TO THE REGIONAL MARKET.
Up And Away
DRAGAN PETKOVIC, SECURITY PRODUCT LEADER ECEMEA, ORACLE, DISCUSSES WHY CLOUD SECURITY IS NOW MORE IMPORTANT THAN EVER AND WHY COMPANIES MUST DEFEND THEMSELVES AT EVERY LAYER OF THEIR IT ENVIRONMENT.
In-Depth Expertise
Lancy Andrade, Security Consultant, Gulf Software Distribution, Sat Down With Security Advisor Me To Discuss Why Conducting A Comprehensive Risk Assessment Is Key To The Success Of Any Security Strategy.
Uncovering The Unknown
At The Sidelines Of Last Month’s Dell Technologies World 2019 In Las Vegas, Security Correspondent Daniel Bardsley Sat Down With Top Executives From The Tech Giant’s Subsidiary, Secureworks, To Discuss The Firm’s Latest Threat Detection And Response Solution – Red Cloak.
“The Connected Future Depends On A Robust Infrastructure”: BICSI
The Three-day Conference Explored The Increasing Reliance On Digital Infrastructure And How Advanced Technologies Will Impact The Future Of The Industry.
A Weapon Of Mass Disruption
As Organisations Take Their Businesses Online, They Become Vulnerable To Cyber-attacks That Are Increasing In Frequency, Intensity And Sophistication. Distributed Denial-of-service (ddos) Attack Remains As One Of The Most Popular Cyber Threats. Security Correspondent Daniel Bardsley Speaks To Industry Experts To Discuss The Current State Of Ddos Attacks And How Organisations Can Steer Clear.
The Business Of Security
Cybersecurity Is Increasingly Becoming A Huge Area For Innovation And With Renewed Interest In Online Safety And Privacy The Industry Is Attracting Attention From The Investment World. However, With The Landscape Becoming Saturated, Are Cybersecurity Firms As Good As Business Investments? Daniel Bardsley Investigates.
Safe Space
SMART CITIES AND THE TECHNOLOGIES WITHIN THEM WILL BRING A PLETHORA OF BENEFITS AND TRANSFORM THE WAY WE LIVE AND WORK. HOWEVER, IT CAN BE A DOUBLE-EDGED SWORD, AS WITH THE BENEFITS COME A SERIES OF SECURITY RISKS. GENETEC REGIONAL DIRECTOR FOR META FIRAS JADALLA DISCUSSES HOW THE COMPANY CAN MAKE SMART CITIES SAFE.
Security On Point
FOR THE PAST SEVERAL YEARS, POINT OF SALE (POS) SYSTEMS HAVE BEEN A PRIME TARGET FOR CYBER-ATTACKS, MAKING IT MORE IMPORTANT THAN EVER FOR RETAILERS TO CONSIDER THE SECURITY OF THESE MACHINES AND THE INFORMATION THEY STORE.
Digital Front Lines
AS MILITARIES INCREASINGLY MOVE DATA TO THE CLOUD, HOW CAN GOVERNMENTS MAINTAIN THE CYBERSECURITY OF THEIR DEFENCE FORCES IN THE ERA OF DIGITISATION? SECURITY CORRESPONDENT DANIEL BARDSLEY REPORTS.
At Your Fingertips
MOREY HABER, CTO, BEYONDTRUST, SHARES INSIGHTS INTO HOW ORGANISATIONS CAN LEVERAGE PAM FOR EFFECTIVE CYBER FORENSICS AND SECURITY BREACH REMEDIATION.
Shifting Threats Push Businesses To Rethink Security Priorities
THREAT REPORT REVEALS SIGNIFICANT INCREASE IN PHISHING, CRYPTOCURRENCY MINING AND BEC ATTACKS
Set For Growth
WITH A MISSION OF DELIVERING HIGH VALUE SECURITY OFFERINGS, GULF IT DISTRIBUTION IS COMMITTED TO ITS “PARTNER-FOCUSED AND CUSTOMERCENTRIC” STRATEGY. THE TEAM AT THE UAE-BASED VAD – FERAS AL HAKIM, CHANNEL MANAGER; ANEEZ ABBAS, CHANNEL SALES MANAGER - UAE; AND LOAI AHMAD MAHMOUD JAMOUS, COUNTRY MANAGER - SAUDI ARABIA – SAT DOWN WITH SECURITY ADVISOR ME TO DISCUSS HOW THEY ARE PRIMED TO ADDRESS THE GROWING SECURITY DEMANDS IN THE REGION
You've Got Mail!
AS AN INTEGRAL COMMUNICATION AND COLLABORATION TOOL FOR ANY ORGANISATION ACROSS THE GLOBE, EMAIL REMAINS AN ATTRACTIVE ATTACK VECTOR FOR CYBERCRIMINALS. HUSNI HAMMOUD, GENERAL MANAGER, MIDDLE EAST, CEE AND TURKEY, BARRACUDA NETWORKS, DISCUSSES HOW ORGANISATIONS CAN STAY ONE STEP AHEAD OF THE BAD GUYS.
Why Security In The Connected Workplace Is Everyone's Business
There was a time when cyber security was limited to a desktop computer with antivirus software.
How To Close The Cybersecurity Gap In The Digital Era
What’s stopping global businesses from protecting their assets despite significant investments in cybersecurity programmes?
Cutting Through The Noise
Amit Roy, Executive Vice President and Regional Head, Emea, Paladion, Discusses How Organisations Can Speed Up Incident Detection and Response Amid Growing Volumes of Threat Data.
Mine Of Information
No one needs to be told that the cyber threats facing businesses today are both numerous and diverse, ranging from data breaches to ransomware to distributed denial of service attacks.
Risky Business
The Cloud Is Everywhere Today. However, Many Organisations as Well as Individuals Still Don’t Fully Trust the Nature of the Cloud. Security Correspondent Daniel Bardsley Speaks to Experts About the Risk Perception and Privacy Challenges of the Cloud.
Silver Linings
The cloud has undeniably become one of the most overhyped technologies in decades and rightly so.
The Unusual Uspects
More Often Than Not Organisations Are Warned About Security Incidents That Make The Headlines Tend To Be About Catastrophic Technology Failures Or Breaches Caused By Nefarious Actors. However, What Business Leaders Need To Realise Is That Sometimes The Most Dangerous Threats Could Be Right Under Their Noses.
Digital Afterlife
As Technology Advances, Social Media Platforms Such As Facebook And Twitter Have Become An Integral Part Of Our Everyday Lives. But What Happens To Our Online Identities And Data When We Die? Daniel Bardsley Speaks To Industry Experts To Discuss Why We Need To Plan Our Digital Legacy.
The Big Picture
Sam Olyaei, Senior Principal Analyst And Conference Chair, Gartner, Discusses How Security And Risk Strategies Have Evolved In The Digital Age.
Love In The Time Of Cybersecurity
MOBILE DATING APPS ARE INCREASINGLY GAINING POPULARITY TODAY AS THEY EFFORTLESSLY HELP CONNECT PEOPLE WHO SHARE SIMILAR INTERESTS THROUGH THE PUSH OF A BUTTON OR SWIPE OF A FINGER. HOWEVER, THE AMOUNT OF SENSITIVE PERSONAL INFORMATION THEY CONTAIN IS CAUSE FOR CONCERNS WHEN IT COMES TO CYBERSECURITY, DANIEL BARDSLEY REPORTS.