With human control and moderation, GenAI models have the potential to revolutionise enterprise environments.
Opinion: UAE technologists adopting application observability to manage multi-cloud environments
James Harvey, CTO Advisor, EMEA, Cisco AppDynamics has penned an exclusive op-ed which examines how UAE businesses are switching to …
Winning the race against fraudsters by using the power of analytics
With the explosion of digitisation across industries, opportunities for fraud and financial crime have grown exponentially.
Does MFA solve the threat of account takeover?
Because MFA is a significant improvement over password-only authentication, it is here to stay, so cybersecurity practitioners must address its vulnerabilities.
Vectra AI research shows that 96% of analysts fear missing security red flags
96% of security analysts in the UAE and KSA fear they are missing a relevant security event according to new …
Rootkit detections in the UAE up by 167% in the first five months of 2023
This spike reflects a similar trend in the Middle East region, which projected a two-fold hike (103%) in Rootkit detections, as compared to the first five months of last year.
Almost all organisations are lagging on digital transformation as pace of change accelerates
F5’s Inaugural Digital Maturity Index: Only 4% rank at the highest level of digital maturity, compared to 31% classed as ‘dawdlers’.
“Don’t write off the potential of blockchain just yet” – Paul Lalovich, Agile Dynamics
Paul Lalovich, Managing Director at Agile Dynamics, has said that some of commentary regarding the demise of blockchain is very …
Opinion: How can technology help with the growing problem of ‘quiet quitting’?
Ekta Puthran, Head of Sales APAC & MEA – Collaboration, at Barco, has penned an exclusive op-ed, which outlines how businesses need …
Cisco cybersecurity director shares five top tips to keep you secure this summer
Fady Younes, Cybersecurity Director, EMEA Service Providers and MEA, Cisco has penned a thought-leadership article that provides businesses and employees …
83% of successful cyberattacks in the Middle East had a targeted nature
Attacks on Middle Eastern government agencies are mainly carried out by APT groups (56%), covertly establishing themselves in the victim’s infrastructure for the purpose of cyberespionage.
Re-examining the role of the Chief Information Security Officer (CISO)
Ezzeldin Hussein, Sales Engineer Director at SentinelOne tells Anita Joseph how the role of the CISO has evolved from being …
Only 2% of organisations feel confident with current security strategies inbox
With at least 75% of Organisations Upgrading Infrastructure and 78% Increasing Security Budgets, OPSWAT’s Latest Report Highlights Disparity Between Infrastructure Upgrades, Spending and Security Improvements.
Indicator of Attack – What comes before a good old indicator?
Behavioural correlation of events from multiple sources helps to act faster, get more attack context and start looking for previously unseen activities.