Securing the Hybrid Workplace
Jacob Chacko Regional Business Head – Middle East, Saudi & South Africa (MESA) at HPE Aruba, talks about securing the hybrid workplace without effecting the productivity of the employees.Read More…
Jacob Chacko Regional Business Head – Middle East, Saudi & South Africa (MESA) at HPE Aruba, talks about securing the hybrid workplace without effecting the productivity of the employees.Read More…
Researchers at WatchGuard Technologies’ Threat Lab predicted that automation will play a major role in shaping cyber security attack and defence activities in 2021.Read More…
Raffael Marty, Vice President Research and Intelligence, Forcepoint, talks about the inherent bias in machine learning.Read More…
Niall Browne, Chief Information Security Officer at Palo Alto Networks, offers insights into the core principles on which the SOC of the future should be built.Read More…
Claude Schuck, regional manager, Middle East at Veeam Software has identified four key areas all businesses must address to ensure business continuity.Read More…
Palo Alto Networks has announced new enhancements to its comprehensive Security Orchestration, Automation, and Response (SOAR) platform, Demisto. Demisto v5.0 enables security analysts to tailor the way they visualise incident and indicator flows, allowing security teams to better manage and automate incident response.Read More…
Paul Potgieter, Managing Director – UAE, Dimension Data, explains that no matter the degree of adoption and integration, the security challenges of digital organizations are vastly different from those of legacy organizations. With the benefits of cloud platforms and mobility becoming increasingly obvious in the region, organizations have now started migrationRead More…
Derek Manky – Global security strategist, Fortinet, says that many developers, along with professional threat researchers, employ a technique known as Fuzzing that is designed to discover vulnerabilities in hardware and software interfaces and applications. By injecting invalid, unexpected, or semi-random data into an interface or program, security engineers can then monitorRead More…
Copyright © 2023 - Zarks Media. All rights reserved