Written by Johan Paulsson, CTO, Axis Communications; Mats Thulin, Director Core Technologies, Axis Communications; and Thomas Ekdahl, Engineering Manager, Axis Communications
Written by Craig Sanderson, Principal Cyber Security Strategist at Infoblox
Critical infrastructure—spanning energy, water, transport, and telecoms—forms the backbone of modern society but faces growing cyber threats in a digital-first world. Global entrepreneur Roman Ziemian emphasises...
Written by Fady Younes, Managing Director for Cybersecurity at Cisco Middle East, Africa, Türkiye, Romania and CIS
Written by H.E. Dr. Mohamad Al Kuwaiti, Head of Cybersecurity, UAE Government, and Dr. Aloysius Cheang, Chief Security Officer, Huawei Middle East & Central Asia
By Derek Manky, Chief Security Strategist and Global VP Threat Intelligence | Board Advisor | Threat Alliances at FortiGuard Labs
Written by Derek Manky, Chief Security Strategist & Global VP Threat Intelligence, FortiGuard Labs
Written by Lev Matveev, Founder of SearchInform
Personally, I love shadow IT—most employees do. But is it a problem? Let’s explore. Wondering what shadow IT is? Shadow IT refers to the use of...
Written by Roman Cuprik, Content Writer at ESET