Your survival guide for the 2022 cyberthreat landscape.
Cisco executive outlines Top 5 tips for mitigating the threat of device sharing
Martin Lee, EMEA Lead for Cisco Talos, outlines his 5 top tips to mitigate the ongoing threat of device sharing, … 0 473Conti Gang Encrypts Karma’s Extortion Notes in Dual Ransomware Attack
Conti Gang Encrypts Karma’s Extortion Notes in Dual Ransomware Attack, Sophos Research Reveals.
Security Frontrunners: Women in cybersecurity
On the occasion of Women’s Day, we bring you our pick of the leading ladies in the field of cybersecurity. …
Trend Micro provides a glimpse into the future of cybersecurity with Project 2030
Trend Micro provides a glimpse into the future of cybersecurity with Project 2030.
Assessing cybersecurity today to improve and protect tomorrow’s manufacturing operations
Assessing cybersecurity today to improve and protect tomorrow’s manufacturing operations.
Interview: SECURITY. NO COMPROMISE.
Aloysius Cheang, Chief Security Officer at Huawei UAE, tells Anita Joseph, Editor, Security Advisor Middle East in an exclusive interview, …
Axon Technologies Strengthens Operations with Key Hires
Axon Technologies Strengthens Operations with Key Hires.
VMware signs MoU with Aramco to Drive Innovation in Energy Sector
VMware signs MoU with Aramco to Drive Innovation in Energy Sector.
Attivo Networks cybersecurity predictions: Identity protection to be a priority in 2022
By Ray Kafity, Vice President – Middle East Turkey and Africa (META) at Attivo Networks Every year, IT and cybersecurity …
Trellix: Putting XDR in the spotlight
Trellix is a new cybersecurity powerhouse born out of the previously announced merger of McAfee Enterprise and FireEye in October …