Written by Steven Hope, CEO, Authlogics Have you ever shared your Netflix password? If so, you are not alone. But have you stopped to think about...
Written by Zeki Turedi, CTO of EMEA at CrowdStrike After several years in which commercially motivated cybercrime has ranked highest in eCrime league tables, the last...
Written by Michael Byrnes, Director – Solutions Engineering, iMEA, BeyondTrust The GCC is humming with cloud activity, and understandably so. The cost-benefit analysis of cloud services...
Written by Allen McNaughton, Systems Engineering Director for Infoblox Public Sector It’s no secret that the cybersecurity industry is in something of a talent crisis. The...
Written by Claude Schuck, Regional Director, Middle East at Veeam Software Kubernetes is still in its early educational phase as a technology. On Gartner’s Hype Cycle,...
Written by André Lameiras, Security Writer at ESET Running and growing a business is hard work even in good times, but times of crisis bring a...
Written by Ram Narayanan, Country Manager at Check Point Software Technologies, Middle East A survey carried out in the last year revealed that almost half (49%)...
Organizations worldwide should remain on high alert for cyberattacks as the risk of major cyber-spillover from the crisis in Ukraine continues to loom large, writes Andrew Lee,...
Written by Barbara Maigret, Global Head of Sustainability & CSR at Fortinet This year, on International Women’s Day, governments, organizations, and individuals worldwide were asked to...
Check Point Software Technologies Ltd. has seven tips to keep your smart home devices out of the hands of hackers. In an increasingly connected world, it...