Safety and security in tourist capital, Dubai While the city of Dubai is touted as one of the safest in …
Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime
The shift to the subscription economy has created a new norm in the as-a-service world. And it’s not just Netflix …
Interview: Sanjay Phatak, Managing Director Middle East at ISS Security
Sanjay Phatak, Managing Director Middle East at ISS Security tells Anita Joseph how the company manages to maintain its growth …
Tenable completes acquisition of Bit Discovery, announces Tenable.asm for external attack surface management
Tenable Holdings, Inc. (“Tenable”), the Cyber Exposure company, has announced that it has closed its acquisition of Bit Discovery, Inc. …
‘Data mistrust’ could compromise technology-driven change
Consumers hungry for digital innovation but two thirds uncertain who has access to personal data Two thirds (66%) of European …
New pairing-based approach speeds security for blockchain and other apps
New pairing-based approach speeds security for blockchain and other apps.
How secure is your cloud storage -Mitigating data security risks in the cloud
How secure is your cloud storage -Mitigating data security risks in the cloud.
Cloud, Security and Containers Should be Key Focus for the Channel
Cloud, Security and Containers Should be Key Focus for the Channel.
Four Ways to Power Security in Large Sites and Open Areas
Four Ways to Power Security in Large Sites and Open Areas.
Attivo Networks: Addressing cyber identity-based attacks
Ray Kafity, Vice President Middle East, Turkey & Africa, Attivo Networks discusses their portfolio on display at GISEC 2022 and how security can be assured in this age of the hybrid workspace.