Morey Haber, CTO at BeyondTrust discusses 5 best practices for getting your organization “Privilege Ready” People are an organizations’ most valuable resource. But they can also be its greatest vulnerability, especially when armed with weak credentials, all-too-powerful privileged accounts, and security ignorance or hubris. The problem is simple—too many users haveRead More…

Cyber-attacks cost companies worldwide an estimated $300-400 billion each year in unanticipated downtime and that number is projected to increase sharply. Some large industrial organizations estimate their cost of downtime in the millions of dollars per hour.Read More…

Fortinet announced the findings of the 2018 independent survey of over 300 Chief Information Security Officers (CISOs) and Chief Security Officers (CSOs) at 2,500+ employee organizations about the Security Implications of Digital Transformation (DX), which provides insights into the state of cybersecurity in organizations around the world. According to the survey,Read More…

Tomas Foltyn, security writer from ESET in this article discusses the far-fetched idea of knocking down a power grid with an home appliance but according to researchers electrical grids and smart home appliances could make for a dangerous mix Cybercriminals could rope internet-connected household appliances into a botnet in order toRead More…

Trend Micro announced that one of the largest banks in the Sultanate of Oman, Oman Arab Bank (OAB), has selected Trend Micro to secure its digital universe. Currently, the bank operates more than 65 branches and representative offices, and over 148 ATMs across the Sultanate and is known for setting upRead More…

Harish Chib, Vice President for Middle East & Africa at Sophos explains how not to let your network become part of the next global botnet attack Botnets are large volumes of distributed networked computers and devices that have been taken over by a cybercriminal.Read More…