Establishing a paranoid but blame free culture that reports suspicious activity — as well as genuine mistakes — early and often helps ensure incidents (no matter how rare) are reported as soon as possible.

Establishing a paranoid but blame free culture that reports suspicious activity — as well as genuine mistakes — early and often helps ensure incidents (no matter how rare) are reported as soon as possible.
Vertiv trends forecast sees intense focus on AI enablement and energy management.
Senior leadership must be involved in cyber-risk governance to ensure that the companywide governance plan aligns with overall corporate objectives.
Kingston Technology: Privacy and data security ‘imperative for every financial organisation’ as cost implications reach record-high US$ 8 million in Middle East.
As cloud giants compete for dominance in these regions, the outcome will see the Middle East and Africa playing an increasingly vital role in shaping the future of connectivity and digital innovation on a global scale.
Trellix report highlights new programming languages in malware development, adoption of malicious GenAI, and acceleration of geopolitical threat activity.
Threat Predictions for 2024: Chained AI and CaaS Operations Give Attackers More “Easy” Buttons Than Ever.
Only 26% of Surveyed Organisations Stopped Cybercriminals from Encrypting Their Data in a Ransomware Attack. This Is the Lowest Rate of Disruption in 3 Years.
Public and private organisations have already begun suggesting how they believe 6G will differ from existing networks. Some have predicted that 6G will be AI native, focused on machine learning, compared to existing cloud-native 5G networks.
There are a variety of initiatives already underway to attract a broader (and largely untapped) talent pool to the cybersecurity field.
CNME Editor Mark Forker spoke to Moe Raslan, Regional Sales Director MENA at CommScope Ruckus, to find out how their Ruckus One Platform is helping enterprises deploy ‘future-proof’ networks in the ever-evolving and complex digital economy.
Igor Akhmetov, Head of Customer Support, META & APAC at Kaspersky, writes an exclusive Op-Ed column for Tahawultech.com, where he …
Hackers will also exploit our trust to facilitate a cybersecurity breach. This could be something as simple as an employee clicking an untrustworthy link or sharing sensitive information with a hacker posing as someone else.
Lev Matveev, Chairman of the Board of Directors of SearchInform outlines a significant lack of preparedness against cyber threats and …