Category: Opinions

Threat simulation key to test cyber defences

Kelly Ambriz, International Business & Market Development Manager, Government Sector, Keysight Technologies, talks about why businesses should use threat

Read More...

Unpatched DNS vulnerabilities impact many IoT products

Mohammed Al-Moneer, Regional Director, META at Infoblox, explains how to plug the unpatched vulnerabilities in the DNS.

Read More...

Best practices for password security

David Warburton, Threat Research Lead, F5 Labs, offers password safety and security best practices recommendations.

Read More...

Does one size fits all?

Jacob Chacko, Regional Director – Middle East, Saudi & South Africa at Aruba, a Hewlett Packard Enterprise explains how

Read More...

Three most dangerous kinds of Android malware

Lukas Stefanko, Malware Researcher at ESET explains here’s what you should know about some of the nastiest mobile malware

Read More...

Mitigating cybersecurity risks organizations cannot afford to ignore

Sander Vinberg, Senior Threat Evangelist at F5 Labs, highlights the tactics organisations need to stay safe

Read More...

Easy access to cloud-native applications in cloud

Amr Alashaal, Regional Vice President – Middle East at A10 Networks, talks about easy access to cloud-native applications in

Read More...

Businesses must consider to raise the bar on digital acceleration

Jonathan Nguyen-Duy, Vice President, Global Field CISO at Fortinet, lists the three components that businesses must consider to raise

Read More...

Mobile Sliding Menu