You don’t want to wake up one day to the news that your organization’s network security has failed. When a network failure occurs, critical operations may...
Vectra AI has announced its annual threat predictions for cybersecurity stakeholders in the United Arab Emirates. Company experts Oliver Tavakoli, CTO, and Christian Borst, CTO EMEA,...
Written by Amr Alashaal, Regional Vice President – Middle East at A10 Networks
Written by Patrick Joyce, Resident CISO, Proofpoint In the ever-evolving landscape of cybersecurity, defenders find themselves navigating yet another challenging year. Threat actors persistently refine their...
Written by John Fokker, Ernesto Fernández Provecho & Bevan Read at the Trellix Advanced Research Center
Big Tech is all in for bug bounty programs while global cyberattacks are increasing. While we can’t control the number of hackers or their intent to...
In business, impermanence is the only certainty. An example is how organizations addressed the COVID-19 pandemic. Within a few weeks, many developed a plan to run...
According to a survey by Statista, typically, global enterprises dedicate a minimum of 12% of their IT expenditure to information security measures. While larger companies can...
Written by Lev Matveev, SearchInform Founder and Chairman of the Board of Directors 75% of information security experts consider insider threats more dangerous than hacker attacks....
Written by Bashar Bashaireh, Managing Director, Middle East & Turkey, Cloudflare Email is the most exploited business application. It is the primary initial attack vector for...