Digital Shadows believes that whatever happens in 2018 and beyond, it is clear that cybercrime will continue to be a problem and present governments, businesses and individuals with challenges to protect their data and their intellectual property. Alastair Paterson, CEO and Co-Founder, Digital Shadows discusses how the threat landscape will look like over the next 12Read More…

Guest written by Mechelle Buys Du Plessis, Managing Director – UAE at Dimension Data 2018 will see a vast change in internal security procedures moving towards what is called a zero-trust security model. IT departments of organizations are spending millions of dollars while witnessing successful breach of their defences. Increasingly,Read More…

Guest written by: Mazen A. Dohaji, Regional Director – Middle East, Turkey & Africa, LogRhythm The energy sector specifically is becoming an increasingly popular target for hackers. According to the Department of Homeland security in the United States, the energy sector faces more cyber-attacks than any other industry. Even moreRead More…

Guest Written by Sunil Gupta, president and COO at Paladion Blockchain, the technology that is used in the popular cryptocurrency ‘Bitcoin’, is revolutionary in many ways. It addresses multiple challenges associated with digital transactions, such as double spending and currency reproduction. Employing blockchain also reduces the cost of online transactionsRead More…

Guest written by: Alain Penel, Regional Vice President – Middle East, Fortinet Online retailers are gearing up for the biggest shopping day of the year. With more consumers doing their holiday shopping online, additional compute resources and warehouses bulging with inventory ensure that shoppers won’t experience any delays in findingRead More…

Brad Hibbert, Lead Solutions Strategist at BeyondTrust shares his ten recommendations that can help you can stop an attacker from penetrating your defences, slow them down, and/or detect them faster in order to mitigate the impact.Read More…

Ali Kaddoura, Country Manager UAE, Citrix discusses the pros and cons of having federated identity, an arrangement that allows subscribers to use the same identification data to obtain access to the networks of all enterprises in the group and what the future might look like for enterprise security in this respect.Read More…