Global Cybersecurity Leader eSentire Names Spire Solutions as its Exclusive Value-Added Distributor in the Middle East and Africa during GITEX 2022.
Cisco executive outlines Top 5 tips for mitigating the threat of device sharing
Martin Lee, EMEA Lead for Cisco Talos, outlines his 5 top tips to mitigate the ongoing threat of device sharing, … 0 715The right kind of skill
Chris Dale, Principal Instructor at SANS Institute, on Cyber Deception, Cybersecurity, the threat landscape and more.
AmiViz and Blackberry highlight predictive intelligence cybersecurity at GITEX 2022
AmiViz and Blackberry showcase the predictive intelligence of cybersecurity at GITEX 2022.
Special Interview: The Power of Threat Intelligence
Amir Kanaan, Managing Director for the Middle East, Turkey and Africa at Kaspersky tells Anita Joseph why Threat Intelligence is essential …
A10 Networks reveal the best practices for preventing Botnet attacks
Amr Alashaal, Regional Vice President – Middle East at A10 Networks, highlights the security ramifications and impact that Log4j is …
CyberArrow and G42 Cloud team up to enhance cybersecurity
CyberArrow signs MOU with AI & Cloud Computing platform G42 Cloud to enhance cybersecurity in public and private entities.
“I think what differentiates Lenovo is the people and the culture” – Nima Baiati
CNME Editor Mark Forker spoke to Nima Baiati, Executive Director & General Manager, Cybersecurity Business Unit at Lenovo to discuss …
Opinion: Meeting the new challenges of EnemyBot head-on
Maher Jadallah, Senior Director Middle East & North Africa at Tenable Botnets first gained widespread notoriety in the early 2000s …
Feature: International Women in Cybersecurity Day
International Women in Cyber Day (IWCD) began as an occasion to provide support and recognition for women in cybersecurity. Today, …
Adversaries exploit stolen session cookies to bypass Multi Factor Authentication & gain access to corporate resources: Sophos Report
Sophos, a global leader in next-generation cybersecurity, has announced in the Sophos X-Ops report, “Cookie stealing: the new perimeter bypass,” …