ThreatQuotient has announced its first appearance at the MENA Information Security Conference (ISC) in Riyadh this year.
Cisco executive outlines Top 5 tips for mitigating the threat of device sharing
Martin Lee, EMEA Lead for Cisco Talos, outlines his 5 top tips to mitigate the ongoing threat of device sharing, … 0 724Tech leaders to discuss transformative power of AI at Evolve
A number of prominent technology experts will gather to discuss the transformative power of AI and other disruptive technologies at …
Gartner names Sophos a leader in EPP magic quadrant
Global leader in network and endpoint security firm Sophos has announced that Gartner, has once again positioned Sophos as a Leader in its Magic Quadrant for Endpoint Protection Platforms.
Twitter CEO Jack Dorsey’s account got hacked
The Twitter account of Jack Dorsey, Twitter’s chief executive officer, was hacked and briefly hijacked on Friday.
Help AG accelerates AI-powered cybersecurity with new partnership
Help AG will bring to market Exabeam’s security information and event management (SIEM) and user and entity behaviour analytics (UEBA) solutions.
CrowdStrike named among leaders in Gartner Magic Quadrant for EPP
CrowdStrike has announced it has been positioned by Gartner in the Leaders quadrant of the “Magic Quadrant for Endpoint Protection Platforms.”
New ransomware grows 118% as cybercriminals adopt fresh tactics: report
Global cybersecurity firm McAfee has recently released a new industry report examining cybercriminal activity and the evolution of cyber threats in Q1 2019.
Human error a big risk to industrial cybersecurity: Kaspersky
Despite automation, the human factor can still put industrial processes at risk: employee errors or unintentional actions were behind 52 percent of incidents affecting operational technology and industrial control system (OT/ICS) networks.
Centrify strengthens commitment to securing modern enterprises
Centrify executives have joined key working groups within the Cloud Security Alliance (CSA), a global organisation dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment.
The unusual suspects: human error’s impact on cybersecurity
More often than not organisations are warned about security incidents that make the headlines tend to be about catastrophic technology failures or breaches caused by nefarious actors. However, what business leaders need to realise is that sometimes the most dangerous threats could be right under their noses.