Regional value-added distributor emt Distribution has announced the launch of emt | Care for META region. The initiative is aimed …
Ring to promote smart home offerings at Intersec Saudi Arabia
At the event, Ring will promote its home security products and services, giving customers and attendees the opportunity to experience Ring products firsthand.
Why conducting a cybersecurity due diligence is vital in M&A deals
As security increasingly becomes a boardroom issue, cyber risks should be a focal point in M&A talks. Industry experts share insights into why conducting a cybersecurity due diligence is necessary before signing on the dotted line.
Juniper Networks to redefine enterprise branch with new cloud service
Juniper Networks has announced a cloud-delivered version of its SD-WAN solution.
SANS Institute to deliver “deep, hands-on” cyber skills training at Riyadh summit
SANS Institute has announced SANS Riyadh 2019 to help cyber security professionals in Saudi Arabia develop deep, hands-on skills through immersion-style training.
Fortinet unveils new OS to accelerate security-driven networking
Fortinet has announced the release of the latest version of its flagship operating system, FortiOS 6.2, at its global customer and partner conference—Accelerate 19.
Tenable uncovers vulnerabilities in Verizon routers
Tenable has announced that its research team has discovered multiple vulnerabilities in Verizon Fios Quantum Gateway routers.
Yahoo offers $117 million as data breach settlement
Yahoo has reached a revised $117.5 million settlement with millions of people whose email addresses and other personal information were stolen in the largest data breach in history.
Why cybersecurity needs both AI and human intelligence
AI and humans must work together. AI applies power and programming, while human intelligence contributes judgment, imagination, and creativity.
How university CISOs can keep cyber threats at bay
As digital environments become increasingly embedded in higher education institutions they become more susceptible to cyber-attacks. With elements such as open networks, large volumes of data and increasing endpoints, how can university CISOs keep cyber threats at bay?