With human control and moderation, GenAI models have the potential to revolutionise enterprise environments.

With human control and moderation, GenAI models have the potential to revolutionise enterprise environments.
James Harvey, CTO Advisor, EMEA, Cisco AppDynamics has penned an exclusive op-ed which examines how UAE businesses are switching to …
With the explosion of digitisation across industries, opportunities for fraud and financial crime have grown exponentially.
Because MFA is a significant improvement over password-only authentication, it is here to stay, so cybersecurity practitioners must address its vulnerabilities.
96% of security analysts in the UAE and KSA fear they are missing a relevant security event according to new …
This spike reflects a similar trend in the Middle East region, which projected a two-fold hike (103%) in Rootkit detections, as compared to the first five months of last year.
F5’s Inaugural Digital Maturity Index: Only 4% rank at the highest level of digital maturity, compared to 31% classed as ‘dawdlers’.
Paul Lalovich, Managing Director at Agile Dynamics, has said that some of commentary regarding the demise of blockchain is very …
Ekta Puthran, Head of Sales APAC & MEA – Collaboration, at Barco, has penned an exclusive op-ed, which outlines how businesses need …
Fady Younes, Cybersecurity Director, EMEA Service Providers and MEA, Cisco has penned a thought-leadership article that provides businesses and employees …
Attacks on Middle Eastern government agencies are mainly carried out by APT groups (56%), covertly establishing themselves in the victim’s infrastructure for the purpose of cyberespionage.
Ezzeldin Hussein, Sales Engineer Director at SentinelOne tells Anita Joseph how the role of the CISO has evolved from being …
With at least 75% of Organisations Upgrading Infrastructure and 78% Increasing Security Budgets, OPSWAT’s Latest Report Highlights Disparity Between Infrastructure Upgrades, Spending and Security Improvements.
Behavioural correlation of events from multiple sources helps to act faster, get more attack context and start looking for previously unseen activities.