What lies within

Mohammed Abukhater, Regional Director, Middle East and North Africa, FireEye, discusses the risks brought by insider threats and what it means for your business.

Exclusive Networks strengthens offerings

The distributor is showcasing its new vendor partnerships, including those with SentinelOne, Gemalto and Carbon Black, while also displaying the strengths of its existing brands such as Fortinet, FireEye, F5 Networks and Infoblox.

DarkMatter highlights its ‘Resiliency Model’

DarkMatter, the first ever Cyber Security Innovation Partner for GITEX Technology Week, is making its debut at the 2016 issue of the trade show. The company is also showcasing its ‘Resiliency Model,’ a proprietary methodology that focuses on the interconnected impact of a cyber-incident on varying critical national infrastructure entities.

The means and motivation

FireEye Founder, Vice Chairman and CTO Ashar Aziz discusses the company’s transition to an as-a-service model – and his vision for the impact of a “cyber-geddon” – with Security Advisor Middle East.

Under siege

There has been a dramatic increase in cyberattacks on critical infrastructure but regional organisations remain unprepared.

Offensive security

Carolyn Crandall, CMO, Attivo Networks, discusses how security teams can gain the upper hand by going on the offense and creating an environment that provides continuous real-time detection against an ever-changing landscape of cyber threats.

Centred security

From SDN to cloud, the transition to any modern technology requires careful management. This all starts in the data centre, where carefully chosen solutions can give the enterprise the best chance of success in terms of security.

Losing IT

Highly publicised events have demonstrated that it is now more difficult than ever to protect an organisation’s internal data. Advances in technology and productivity tools have made collaboration in the workplace easier, while also creating new vectors for data to leave the organisation.

Spy games

More and more, headlines are drawing attention to instances of cyber-espionage. Beyond basic hacking, cyber-espionage targets governments or companies with the goal of extracting information or trade secrets. In this secret world, what motivates these hackers and what can be done to stop them.

A suit of armor

As various emerging technologies become popular in business environments, security is a prime concern for organisations. Reseller Middle East explores how partners can make the most of the opportunities present here.

Bad behaviour

Companies can spend untold funds on the latest security software, keep their firewalls and security infrastructure up-to-date, monitor networks, and employ the highest level of IT talent all in the name of security. However, it can all be rendered useless by one simple thing – employees choosing to ignore basic regulations.

Strength in numbers

It can be painful for an organisation to admit that their systems have been breached by a cyber-criminal. However, as cyber-attacks become more aggressive, it is essential that data on cyber-criminality is shared and analysed. It may be that sharing this data, even among competitors, will be the key to protecting our most sensitive information.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines