Dubai based AZCOM IT Distribution has announced a new partnership with Seceon, a leading provider of comprehensive protection, detection and response platform. Seceon enables CIO’s, CISO’s, MSP’s, MSSP’s to reduce their cyber threat risks and their security stack complexity while greatly improving their ability to detect and block threats andRead More…

Veritas Technologies has announced that Microsoft has become the first Veritas 360 Defense partner to achieve Veritas REDLab Validation for its security solutions. After testing Microsoft Defender with real-world malware in its REDLab isolated test laboratory, Veritas has certified the solution for secure integration into the Veritas Alta cloud dataRead More…

DerSecur, a global provider of application security solutions, brings to GITEX its flagship product. DerScanner combines static (SAST), dynamic (DAST) and software composition (SCA) analysis methods in a single interface, making a vulnerability check of an app or an online service precise and intuitive. Visitors of the exhibition would getRead More…

Cloud Box Technologies (CBT) has announced its participation at the GITEX Global 2023. As a Dell Titanium Partner, the company will highlight the hybrid, multi and public cloud offerings. Alongside there will be a strong focus on the cyber security services around endpoint, network and cloud solutions. This will alsoRead More…

Intelligent software security provider Veracode has released research indicating applications developed by organisations in Europe, Middle East and Africa tend to contain more security flaws than those created by their U.S. counterparts. Across all regions analysed, EMEA also has the highest percentage of ‘high severity’ flaws, meaning they would causeRead More…

Global financial technology platform for leading enterprise businesses Adyen has now issued over two billion active network tokens. This milestone shows that Adyen is paving the way for businesses to embrace the innovation of network tokenization which converts regular card numbers into secure non-sensitive tokens. Security remains a top priorityRead More…

As part of a focused effort on vulnerability discovery in data centers, the Trellix Advanced Research Center has found four vulnerabilities in CyberPower’s Data Center Infrastructure Management (DCIM) platform and five vulnerabilities in Dataprobe’s iBoot Power Distribution Unit (PDU). An attacker could chain these vulnerabilities together to gain full accessRead More…

Trend Micro has announced new research revealing that most enterprises invest 5-10% of their IT budgets specifically on private 5G network security, despite an assumption that the technology is secure by default. Greg Young, vice president of cybersecurity at Trend Micro: “When it comes to private 5G network technology, there’s noRead More…