Vibin Shaju, VP Solutions Engineering EMEA at Trellix, explains how XDR is crucial for cybersecurity in GCC as organizations seek …
Hybrid warfare has altered the security landscape: cybersecurity experts
The blurring of lines between the different modes of warfare and weaponisation of non-military means undermine the foundation of the state is one of the most significant security challenges today, experts said.0 6625Automotive Cybersecurity: Opportunities and Challenges
As the automotive industry moves towards a future of connected and autonomous vehicles, ensuring robust cybersecurity is of paramount importance. …
Chainalysis research finds cryptocurrency crime down but ransomware is increasing
Ransomware is the only form of cryptocurrency-related crime that has grown in 2023, with attackers on pace for their second-biggest year ever.
SMBs are still a lucrative niche for cybercriminals
Kaspersky unveils a comprehensive report highlighting the increasing peril faced by small and medium-sized businesses (SMBs) in the current cyberthreat landscape.
Commvault selects AlJammaz Technologies as key distributor in the Kingdom of Saudi Arabia
Commvault, an enterprise data protection leader for today’s global businesses and one of the first data protection vendors to introduce …
Kaspersky names top factors driving APT attacks
Proper configurations of a security solution are crucial to prevent it from disabling or even abusing it – a tactic often seen to be employed by APT groups/actors.
Help AG launches new cyber defence platform, UNIFY
The UNIFY by Help AG platform unifies the capabilities of visibility, collaboration, orchestration and automation for a seamless user experience and consistent service delivery.
Kaspersky updates training software simulation
Each scenario demonstrates the cybersecurity’s true role in terms of business continuity and profitability, highlighting emerging challenges and threats.
Malvertising delivers cryptocurrency-stealing browser extension
A series of malicious actions allow the extension to run stealthily while the user is browsing the internet. As a result, threat actors become capable of transferring the BTC from the victim’s wallet to their wallet using web injections.
Why advanced NDR is a must-have for protecting against rising cyber attacks
Gaurav Mohan, VP, SAARC & Middle East, NETSCOUT explains how depending solely on endpoint detection is not enough to protect …