Guest Written by Sunil Gupta, president and COO at Paladion Blockchain, the technology that is used in the popular cryptocurrency ‘Bitcoin’, is revolutionary in many ways. It addresses multiple challenges associated with digital transactions, such as double spending and currency reproduction. Employing blockchain also reduces the cost of online transactionsRead More…

Guest written by: Alain Penel, Regional Vice President – Middle East, Fortinet Online retailers are gearing up for the biggest shopping day of the year. With more consumers doing their holiday shopping online, additional compute resources and warehouses bulging with inventory ensure that shoppers won’t experience any delays in findingRead More…

Brad Hibbert, Lead Solutions Strategist at BeyondTrust shares his ten recommendations that can help you can stop an attacker from penetrating your defences, slow them down, and/or detect them faster in order to mitigate the impact.Read More…

Ali Kaddoura, Country Manager UAE, Citrix discusses the pros and cons of having federated identity, an arrangement that allows subscribers to use the same identification data to obtain access to the networks of all enterprises in the group and what the future might look like for enterprise security in this respect.Read More…

Henk Jan Spanjaard, Vice President of EMEA Sales at A10 Networks  discusses how threat actors are using IoT and connected devices to launch DDoS attacks and what can be done to shield enterprise data, applications and networks from such attacks. Read More…

Kaspersky Lab researchers have discovered a new malware which steals cryptocurrencies from a user’s wallet by replacing their address with its own in the device’s clipboard. Criminals are targeting popular cryptocurrencies such as Bitcoin, Ethereum, Zcash, Dash, Monero and others. Indeed, criminals have already succeeded with bitcoin wallets, earning almostRead More…

Guest Written by the security experts from BeyondTrust; the CTO, Brad Hibbert, the VP Technology, Morey Haber, the Technology Fellow, Scott Carlson and Director of Security Architecture It’s that time of year again when we look back at what has motivated the market for IT cybersecurity solutions in the last yearRead More…