Anatomy of a DDoS attack
Ali Sleiman, Technical Director MEA at Infoblox, provides an understanding of DDoS attacks and offers tips on how to mitigate these attacks.Read More…
Ali Sleiman, Technical Director MEA at Infoblox, provides an understanding of DDoS attacks and offers tips on how to mitigate these attacks.Read More…
Vishnu Taimni, Vice-President & Managing Director at HP Middle East and Turkey highlights four major cybersecurity threats that organizations should prepare for in 2022Read More…
Amer Owaida, Security Writer at ESET explains how to spot the signs of a hacked phone and remove the hacker from your phone, if your smartphone has been compromised by malware.Read More…
In cybersecurity terminology, an exploit is a bit of code or a program that takes advantage of vulnerabilities or flaws in software or hardware. An exploit is not malware, but rather a way to deliver malware like ransomware or viruses.Read More…
Paul Proctor, Distinguished VP Analyst at Gartner explains that one should stop pointing at the CIO when it come to manage cybersecurity it should be a shared responsibility especially when every day decisions made by business leadersRead More…
Joe Robertson, Director of information security and EMEA CISO at Fortinet discusses the risks associated behind the Internet of ThingsRead More…
John Hultquist, VP of Intelligence Analysis, Mandiant outlines the scope of the Russian cyber capability and outlining potential activity.Read More…
Phil Muncaster, guest writer at ESET explains the signs to look for, how account takeover attacks commonly occur, and how to recover your account and avoid falling victim again.Read More…
Copyright © 2026 - Zarks Media. All rights reserved