The market is abuzz with discussions on how the security landscape is evolving and analyst firms are ready with their predictions on the increase in spending on cybersecurity. However, there continues to be a persistent rise in the number and level of security breaches occurring worldwide. If only small playersRead More…

Brad Hibbert, Lead Solutions Strategist at BeyondTrust shares his ten recommendations that can help you can stop an attacker from penetrating your defences, slow them down, and/or detect them faster in order to mitigate the impact.Read More…

Ali Kaddoura, Country Manager UAE, Citrix discusses the pros and cons of having federated identity, an arrangement that allows subscribers to use the same identification data to obtain access to the networks of all enterprises in the group and what the future might look like for enterprise security in this respect.Read More…

Henk Jan Spanjaard, Vice President of EMEA Sales at A10 Networks  discusses how threat actors are using IoT and connected devices to launch DDoS attacks and what can be done to shield enterprise data, applications and networks from such attacks. Read More…