Christos Tulumba, Chief Information Security Officer at Veritas Technologies, has penned a comprehensive op-ed designed to provide CISO’s with a …
Kaspersky inaugurates region’s first Transparency Center in Riyadh
Anita Joseph caught up with Eugene Kaspersky, Founder and CEO of Kaspersky, during the inauguration. Kaspersky Transparency Center, the first …
Tenable integrates Generative AI capabilities with the launch of ExposureAI
Industry’s largest repository of threat, vulnerability and asset data enables unprecedented intelligence to quickly identify and mitigate cyber risk.
Three in five global board members view generative AI as a security risk
More than half (53%) feel unprepared to cope with a targeted attack, up from 47% the previous year.
Dwell time—from when an attack starts to when it’s detected—shrinks to 8 days in 2023
It Takes Less Than a Day for Attackers to Reach Active Directory—Companies’ Most Critical Asset. The Vast Majority of Ransomware Attacks Occur Outside of Business Hours.
Sophos launches incident response retainer
Shorter Attacker Dwell Times Require Faster Response, as Indicated in Sophos’ New Active Adversary Report for Tech Leaders.
OPSWAT Survey reveals only 22% of organisations have a fully mature Threat Intelligence Program
OPSWAT’s 2023 Threat Intelligence survey highlights the urgent need for enhanced detection capabilities to combat evolving malware threats.
ESET research discovers MoustachedBouncer targeting diplomats via network tampering
MoustachedBouncer is a threat group, recently discovered by ESET researchers, which specialises in the espionage of foreign embassies, including European ones, in Belarus. It is very likely aligned with Belarus interests.
Cloud breach surge: AI Cloud defense vital for GCC enterprises
Taj El-khayat, Area VP, South EMEA, Vectra AI reveals GCC’s $7.45M ransomware impact overshadows global averages, fueling demand for AI-powered …
Trellix Research discovers data centre platform vulnerabilities
Trellix Advanced Research Centre’s investigation exposes serious vulnerabilities in CyberPower’s DCIM platform and Dataprobe’s iBoot PDU, highlighting potential unauthorized access …
Tenable integrates generative AI capabilities with the launch of ExposureAI
Industry’s largest repository of threat, vulnerability and asset data enables unprecedented intelligence to quickly identify and mitigate cyber risk.
AI is here: How should CISOs respond?
To stay competitive, it’s essential for organisations to adopt AI technology while safeguarding against potential risks. By taking these steps now, companies can ensure they’re able to reap the full benefits of AI while minimising exposure.
BeyondTrust announces groundbreaking Identity Security Insights solution
Provides organisations with a 360-degree view of all identities and privileges to eliminate blind spots and shut down attack pathways.
Vectra AI launches groundbreaking platform for hybrid attack defense
Vectra AI introduces the Vectra AI Platform with Attack Signal Intelligence™, empowering security teams to combat complex hybrid attacks and …
Why CISO burnout is a growing threat to organisations in the UAE
Many believe they can tolerate the stress of the role; however, burnout in the form of chest pains or panic attacks is very real. Burnout happens suddenly when an often-inconsequential event becomes the step too far, causing a catastrophic breakdown.
The evolution of initial access brokers and mitigating strategies
Layale Hachem, senior solutions engineer at BeyondTrust explains how businesses can defend against IABs by enforcing least privilege, enhancing multi-factor …
Safeguarding Healthcare: Protecting Critical Data and Patient Privacy
Cybercrimes and information security breaches discriminate no one, and the healthcare sector is no exception. With enhanced data storage of …
Cisco: Equipping SMBs for a secure digital transformation journey
Anita Joseph caught up with Mohamad Sabra, SMB Lead, Middle East and Africa at Cisco, to find out how the …
Winning the race against fraudsters by using the power of analytics
With the explosion of digitisation across industries, opportunities for fraud and financial crime have grown exponentially.
Does MFA solve the threat of account takeover?
Because MFA is a significant improvement over password-only authentication, it is here to stay, so cybersecurity practitioners must address its vulnerabilities.