Written by Barbara Maigret, Global Head of Sustainability and CSR at Fortinet Our society faces significant challenges that must be addressed quickly to prevent disruptions that...
Written by Zeki Turedi, CTO – EMEA, CrowdStrike Big data and data science are common words in cybersecurity. Big data is a collection of large and...
Written by Yossi Naar, Chief Visionary Officer, and Cofounder, Cybereason Extended Detection and Response (XDR) is everywhere today, and it seems that every company is rolling...
Written by Sundaram Lakshmanan, CTO of SASE products at Lookout There’s a great scene in the 1997 film “Contact” where the protagonist Dr. Eleanor Arroway, played...
With an ever growing number of smartphone users, the development of mobile applications has become a booming industry. Today there are millions of apps, helping users...
Written by Lukas Stefanko, Malware Researcher at ESET These days, the device in your pocket can do far more than call or send text messages. Your...
Sander Vinberg, the Senior Threat Evangelist at F5 Labs, highlights the tactics organisations need to stay safe Every year, F5 Labs publishes the Application Protection Report. Our...
Written by David Brown, Security Operations Director from Axon Technologies The security strategy of an enterprise is a blend of traditional best practices and those that...
Written by Emad Fahmy, Systems Engineering Manager – Middle East, NETSCOUT Since mid-February, the NETSCOUT Arbor Security Engineering and Response Team (ASERT) has been monitoring the...
Written by Kinda Baydoun, Manager of Channels & Distribution – Middle East, Veeam Software There is a clear wave of optimism as I interact with our...