OPSWAT, a global leader in perimeter defense cybersecurity and pioneer of Deep CDR technology, hosted an incisive roundtable recently, on …
Interview: Future of Identity Security
Rahil Ghaffar, VP – EMEA , WhiteSwan Security tells Anita Joseph how it’s crucial for organizations to prioritize identity security because …
OPSWAT roundtable discussion takes a deep-dive into Zero Trust security
Presented by Sertan Selcuk, from OPSWAT, the discussion titled Zero-Trust Approach to Protecting Critical Environments delved deeply in an analysis of decades of company data and insights.
The evolution of zero trust
Dave Russell, Vice President, Enterprise Strategy at Veeam explores how zero trust security processes have evolved in recent years and how in a landscape where the benchmark for security is constantly shifting, zero trust must continue to adapt in order to survive.
Interview: Skilling next-generation cybersecurity professionals
Anita Joseph caught up with Ned Baltagi, Managing Director – Middle East, Turkey, and Africa at SANS Institute, to find …
HPE and Intertec Systems unveil cutting-edge innovations at GITEX Global 2023
Veronica Martin spoke to Michael Langeveld, Head of Technology & Business Development EMEA at HPE and Swapnil Gandhi, Director of …
Exclusive Interview: Aloysius Cheang, Chief Security Officer, Huawei Middle East and Central Asia
Anita Joseph caught up with Aloysius Cheang, Chief Security Officer at Huawei Middle East and Central Asia, to find out …
BeyondTrust’s Global Survey uncovers critical zero trust insights
The leading authority on intelligent identity and access security, BeyondTrust, has released a new survey titled “Identity Issues Impact Zero …
Introducing content disarm and reconstruction – the zero-trust rebel that frisks every file
Instead, let us consider technology that does not rely on detection but follows zero-trust principles and assumes all files are malicious. This method works by first verifying a file’s type and identifying any embedded content. It removes any content it considers to be potentially malicious and reconstructs the file using only legitimate components. We call this sanitisation method “content disarm and reconstruction”, or CDR.
ISACA UAE Chapter & Tahawultech.com host first edition of Infosec & Cybersecurity Congress
ISACA UAE Chapter & Tahawultech.com hosted the first edition of the Infosec & Cybersecurity Congress at the Habtoor Grand Resort, …