Skip to content
  • NEWSLETTER
Latest
Government and Industrial Sectors Became Top Cybercrime Targets
Structured CVM Becomes Essential for Regional Businesses
Capsule Security Raises $7M to Launch its Guardian Agent Platform
ESET to Secure Chatbot Communications and AI Workflows
Two‑Thirds of UAE Firms Plan to Secure Their Supply Chain
Palo Alto Sets New Standard with Next‑Generation Trust Security
ServiceNow Completes Armis Acquisition
OPSWAT and Emerson Launch Global OT Cybersecurity Partnership
Cloudflare Targets for Full Post-Quantum Security by 2029
Deepfake Fraud Surges as Only 7% of Organizations Are Truly Prepared
Security MEA
Security MEA
  • News
  • Interviews
  • Features
  • Opinions
  • Gallery
  • GITEX
  • GISEC

Opinions (Page 36)

Anatomy of a DDoS attack

2022-02-07
By: Staff Reporter
On: February 7, 2022
In: Opinions

Ali Sleiman, Technical Director MEA at Infoblox, provides an understanding of DDoS attacks and offers tips on how to mitigate these attacks.Read More…

Four top cybersecurity threats in 2022

2022-02-03
By: Staff Reporter
On: February 3, 2022
In: Opinions

Vishnu Taimni, Vice-President & Managing Director at HP Middle East and Turkey highlights four major cybersecurity threats that organizations should prepare for in 2022Read More…

How to spot if your phone has been hacked

2022-01-31
By: Staff Reporter
On: January 31, 2022
In: Opinions

Amer Owaida, Security Writer at ESET explains how to spot the signs of a hacked phone and remove the hacker from your phone, if your smartphone has been compromised by malware.Read More…

The definition and examples of exploit

2022-01-31
By: Staff Reporter
On: January 31, 2022
In: Opinions

In cybersecurity terminology, an exploit is a bit of code or a program that takes advantage of vulnerabilities or flaws in software or hardware. An exploit is not malware, but rather a way to deliver malware like ransomware or viruses.Read More…

Whose job is it to manage cybersecurity?

2022-01-28
By: Staff Reporter
On: January 28, 2022
In: Opinions

Paul Proctor, Distinguished VP Analyst at Gartner explains that one should stop pointing at the CIO when it come to manage cybersecurity it should be a shared responsibility especially when every day decisions made by business leadersRead More…

Know the key business risks behind Internet of Things

2022-01-26
By: Staff Reporter
On: January 26, 2022
In: Opinions

Joe Robertson, Director of information security and EMEA CISO at Fortinet discusses the risks associated behind the Internet of ThingsRead More…

Anticipating cyber threats as the Ukraine crisis escalates

2022-01-25
By: Staff Reporter
On: January 25, 2022
In: Opinions

John Hultquist, VP of Intelligence Analysis, Mandiant outlines the scope of the Russian cyber capability and outlining potential activity.Read More…

Is your email been hacked?

2022-01-25
By: Staff Reporter
On: January 25, 2022
In: Opinions

Phil Muncaster, guest writer at ESET explains the signs to look for, how account takeover attacks commonly occur, and how to recover your account and avoid falling victim again.Read More…

Posts pagination

Previous 1 … 35 36 37 … 105 Next

Latest Posts

Government and Industrial Sectors Became Top Cybercrime Targets

By: Staff Reporter
On: April 21, 2026

Structured CVM Becomes Essential for Regional Businesses

By: Staff Reporter
On: April 21, 2026

Capsule Security Raises $7M to Launch its Guardian Agent Platform

By: Staff Reporter
On: April 21, 2026

ESET to Secure Chatbot Communications and AI Workflows

By: Staff Reporter
On: April 21, 2026

Two‑Thirds of UAE Firms Plan to Secure Their Supply Chain

By: Staff Reporter
On: April 21, 2026

Palo Alto Sets New Standard with Next‑Generation Trust Security

By: Staff Reporter
On: April 21, 2026

ServiceNow Completes Armis Acquisition

By: Staff Reporter
On: April 21, 2026

Copyright © 2026 - Zarks Media. All rights reserved