Tomas Foltyn, security writer at ESET discusses the new format of cyber attack known as “Thermanator” and explains how an attacker can use your body heat against you in order to steal your credentials or any other short string of text that you have typed on a computer keyboard. Read More…

Raj Samani, Chief Scientist at McAfee expresses his opinion about the security preparedness in the world of cloud and cloud services Indeed, this cloud-first strategy has driven organizations to take on many different providers in their cloud ecosystem. As organizations tackle new data use initiatives, intelligence building, new capabilities toRead More…

The Senior Solutions Architect – Alliances at Red Hat, Oliver Horn discusses the new opportunities IoT offers to bridge the gap between Operational Technology and business-oriented Information Technology.Read More…

Ashraf Sheet, regional director, Middle East and Africa at Infoblox highlights the merits of securing networks with threat intelligence for in-depth defence capabilities, plugging all the gaps, and encompassing all products. In a world in which cyber criminals are becoming increasingly stealthy and using increasingly sophisticated techniques, from ransomware to DNSRead More…

Vivek Mistry, Manager, Aruba, a Hewlett Packard Enterprise company explains the 5 steps necessary to secure and avoid any mistakes for connecting the classroom through Wi-Fi. Higher education has paved the way for many of the technologies we use today. With a unique set of demands and workloads comes aRead More…

Michael Xie, Founder, President and CTO of Fortinet shares some pointers on how to raise a tech business successfully As many teenagers can attest to, growing up isn’t easy. In my experience, neither is nurturing a tech business. As firms that find success as start-ups develop into mid-sized and eventuallyRead More…

Article written and contributed by John Madisson, Senior Vice President for Products and Solutions at Fortinet shares his opinion about the fast evolving cyber security landscape and the rise of Cryptojacking in recent times. As the threat landscape continues to become more complex and more difficult to fight, it forcesRead More…

Article written by Debra Bordignon, CTO at Dimension Data discusses in detail that how artificial intelligence will reshape the cybersecurity landscape. Internet TV series like Westworld and Black Mirror are enthralling but also disturbing because the scenarios are real possibilities, based on emerging capabilities of Artificial Intelligence (AI). Can AI reallyRead More…