Skip to content
  • NEWSLETTER
Latest
Cohesity Advances Enterprise AI Resilience
OPSWAT Introduces AI-Native Decision Engine, MetaDefender Aether
SailPoint Redefines Identity Security with New Innovations
Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel
Scams, Deepfakes, and Fake Footage Rising During Middle East Conflict
SentinelOne Appoints Sonalee Parekh as Chief Financial Officer
OpenAI to Acquire AI Security Startup Promptfoo
Hexnode Launches Hexnode IdP
Reclaim Security Raises $26M to Eliminate the 27-Day Remediation Gap
Cato Networks Unveils Auto-Adaptive Threat Prevention Engine
Security MEA
Security MEA
  • News
  • Interviews
  • Features
  • Opinions
  • Gallery
  • GITEX
  • GISEC

Opinions (Page 35)

Countering rising cyberattacks needs appropriate disaster recovery plans

2022-02-10
By: Staff Reporter
On: February 10, 2022
In: Opinions

Rick Vanover, Senior Director, Product Strategy and Dave Russell, Vice President, Enterprise Strategy at Veeam Software, explain why IT departments should ensure appropriate disaster recovery plans are put in place amidst the rising cyberattacks.Read More…

Anatomy of a DDoS attack

2022-02-07
By: Staff Reporter
On: February 7, 2022
In: Opinions

Ali Sleiman, Technical Director MEA at Infoblox, provides an understanding of DDoS attacks and offers tips on how to mitigate these attacks.Read More…

Four top cybersecurity threats in 2022

2022-02-03
By: Staff Reporter
On: February 3, 2022
In: Opinions

Vishnu Taimni, Vice-President & Managing Director at HP Middle East and Turkey highlights four major cybersecurity threats that organizations should prepare for in 2022Read More…

How to spot if your phone has been hacked

2022-01-31
By: Staff Reporter
On: January 31, 2022
In: Opinions

Amer Owaida, Security Writer at ESET explains how to spot the signs of a hacked phone and remove the hacker from your phone, if your smartphone has been compromised by malware.Read More…

The definition and examples of exploit

2022-01-31
By: Staff Reporter
On: January 31, 2022
In: Opinions

In cybersecurity terminology, an exploit is a bit of code or a program that takes advantage of vulnerabilities or flaws in software or hardware. An exploit is not malware, but rather a way to deliver malware like ransomware or viruses.Read More…

Whose job is it to manage cybersecurity?

2022-01-28
By: Staff Reporter
On: January 28, 2022
In: Opinions

Paul Proctor, Distinguished VP Analyst at Gartner explains that one should stop pointing at the CIO when it come to manage cybersecurity it should be a shared responsibility especially when every day decisions made by business leadersRead More…

Know the key business risks behind Internet of Things

2022-01-26
By: Staff Reporter
On: January 26, 2022
In: Opinions

Joe Robertson, Director of information security and EMEA CISO at Fortinet discusses the risks associated behind the Internet of ThingsRead More…

Anticipating cyber threats as the Ukraine crisis escalates

2022-01-25
By: Staff Reporter
On: January 25, 2022
In: Opinions

John Hultquist, VP of Intelligence Analysis, Mandiant outlines the scope of the Russian cyber capability and outlining potential activity.Read More…

Posts pagination

Previous 1 … 34 35 36 … 104 Next

Latest Posts

Cohesity Advances Enterprise AI Resilience

By: Staff Reporter
On: March 11, 2026

OPSWAT Introduces AI-Native Decision Engine, MetaDefender Aether

By: Staff Reporter
On: March 11, 2026

SailPoint Redefines Identity Security with New Innovations

By: Staff Reporter
On: March 10, 2026

Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel

By: Staff Reporter
On: March 10, 2026

Scams, Deepfakes, and Fake Footage Rising During Middle East Conflict

By: Staff Reporter
On: March 10, 2026

SentinelOne Appoints Sonalee Parekh as Chief Financial Officer

By: Staff Reporter
On: March 10, 2026

OpenAI to Acquire AI Security Startup Promptfoo

By: Staff Reporter
On: March 10, 2026

Copyright © 2026 - Zarks Media. All rights reserved