Vacation season is well and truly upon us, and travellers around the world are looking for interesting places to go, cheap places to stay and reasonably...
Written by Rudie Opperman, Regional Manager, Engineering & Training, Middle East & Africa at Axis Communications Building security solutions used to be a binary choice. In...
Enterprises that are considering joining the metaverse bandwagon have been put on high alert against imminent cyberattacks that could expose their valuable data to crippling cyberattacks,...
Recently, the FBI announced that more companies have been reporting people applying to jobs using deepfakes. Imposters use video, images, recordings, and stolen identities pretending to be someone...
Cyberattacks that can steal personal data are on the rise. While most people are aware of phishing attacks, very few are alert to the dangers of...
Written by Taj El-khayat, Managing Director for Growth Markets at Vectra AI Imagine you are in a car race — a race with no second prize....
Written by Paul Nicholson, Sr. Director of Product Marketing at A10 Networks Today’s enterprises have faced many challenges with the pace of change over the last...
Written by Hadi Jaafarawi, managing director – Middle East, Qualys The cybersecurity threat landscape has never been more challenging, sophisticated, and severe. Research suggests that in...
Written by Ram Narayanan, Country Manager at Check Point Software Technologies, Middle East Supply chain attacks aren’t new. If the past couple of years has taught...
Written by Sherrod DeGrippo, Vice President for Threat Research and Detection at Proofpoint As cryptocurrency and non-fungible tokens (NFTs) become more mainstream, and capture headlines for...