As hackers and attackers wreak havoc on the industry, businesses have been looking for a watchful protector to secure their assets. Is security-as-a-service the IT industry’s Dark Knight?
Last month, a former CIA technician leaked information on the National Security Agency’s data gathering surveillance programme dubbed PRISM. Joe Lipscombe investigates what relevance this holds for the Middle East.
If 3,370,780 UAE residents use Facebook, and 80 percent of those replicate their passwords for other accounts, then the opportunity for cyber theft and hackers to infiltrate personal accounts is extremely high.
As more employees demand to use their personal devices for work, IT managers are struggling to both accommodate them and safeguard confidential company data.
Nicolai Solling
Commentary on the UAE’s new Data Privacy Law by Help AG
Commentary on the UAE’s new Data Privacy Law by Help AG.
How to build a strategic approach to securing multi-cloud environments
Nicolai Solling, CTO, Help AG, shares insights into how regional organisations can develop a strategic approach to securing multi-cloud environments.
Help AG launches recruitment platform ‘Capture the Flag’
Recognising the need to identify and hire skilled cybersecurity experts in the Middle East, Help AG has launched a new …
Do users understand data privacy laws & their own rights?
It’s time to confess. At some point, all of us claim to have read – and have subsequently agreed to …
Security-as-a-Service: IT's Dark Knight?
As hackers and attackers wreak havoc on the industry, businesses have been looking for a watchful protector to secure their assets. Is security-as-a-service the IT industry’s Dark Knight?
Possibility in the privacy pitfalls?
Last month, a former CIA technician leaked information on the National Security Agency’s data gathering surveillance programme dubbed PRISM. Joe Lipscombe investigates what relevance this holds for the Middle East.
You have 1 new hack request
If 3,370,780 UAE residents use Facebook, and 80 percent of those replicate their passwords for other accounts, then the opportunity for cyber theft and hackers to infiltrate personal accounts is extremely high.
BYOD: Who's in control?
As more employees demand to use their personal devices for work, IT managers are struggling to both accommodate them and safeguard confidential company data.
Ticking time bomb
The last year has shown more than ever how careful businesses need to be with their data. However, recent reports …
Target located
In 1971, John Draper used a whistle, found in a cereal box, to reproduce a 2,600 Hz tone able to …
GET TAHAWULTECH.COM IN YOUR INBOX
The free newsletter covering the top industry headlines