Report underscores that email is the most exploited threat vector, phishing remains borderless and attackers are increasingly impersonating trusted name brands.
Mitigating downtime during summer travel surges: the power of network visibility
Emad Fahmy, Systems Engineering Manager at NETSCOUT Middle East, explains the importance of network visibility for managing aviation travel surges. …
How to harness the power of Digital Identities
As new solutions continue to emerge, enterprises, employers, and governments need to find ways to maintain high-quality security and convenience with their users.
AI is here: How should CISOs respond?
To stay competitive, it’s essential for organisations to adopt AI technology while safeguarding against potential risks. By taking these steps now, companies can ensure they’re able to reap the full benefits of AI while minimising exposure.
39% in UAE using AI without employer or teacher awareness
Global management consultancy believes unleashing AI is key to GCC growth.
BeyondTrust announces groundbreaking Identity Security Insights solution
Provides organisations with a 360-degree view of all identities and privileges to eliminate blind spots and shut down attack pathways.
Microsoft’s 2023 Work Trend Index Report reveals the impact of digital debt
The report found that while a significant number of employees in today’s workforce are still concerned about technologies like artificial intelligence replacing their jobs, an even greater number have reported that they are eager to push the majority of their workloads to AI in order to have more time for creative and fulfilling tasks.
Why CISO burnout is a growing threat to organisations in the UAE
Many believe they can tolerate the stress of the role; however, burnout in the form of chest pains or panic attacks is very real. Burnout happens suddenly when an often-inconsequential event becomes the step too far, causing a catastrophic breakdown.
The evolution of initial access brokers and mitigating strategies
Layale Hachem, senior solutions engineer at BeyondTrust explains how businesses can defend against IABs by enforcing least privilege, enhancing multi-factor …
Three ways robots can transform the modern warehouse
Vishal Minocha, Infor vice president of product management, looks at the importance of integrating robotics with a modern warehouse management system (WMS) to optimise productivity and performance within the warehouse.
Out of the Sandbox: WikiLoader Digs Sophisticated Evasion
Proofpoint researchers identified a new malware call WikiLoader. It was first identified in December 2022 being delivered by TA544, an actor that typically uses Ursnif malware to target organisations.
Safeguarding Healthcare: Protecting Critical Data and Patient Privacy
Cybercrimes and information security breaches discriminate no one, and the healthcare sector is no exception. With enhanced data storage of …
How digital education solutions can help schools to operate more efficiently
To maximise time and resources available for teaching and student support, many educational institutions are implementing a range of new digital technologies.
Source Code is amongst the most common sensitive data shared to ChatGPT
Within the average large enterprise, sensitive data is being shared to generative AI apps every hour of the working day.