Positive Technologies has conducted comprehensive research into the activities of the APT groups targeting organisations in the Middle East. The experts say that 88% of the groups under review were attacking Saudi Arabia, and the five most attacked sectors were government agencies, manufacturing, telecommunications, the military-industrial complex, and energy. To gain initialRead More…

Qualys has announced it is expanding Qualys CyberSecurity Asset Management to identify unmanaged and untrusted devices in real time. Leveraging the Qualys Cloud Agent to continuously monitor the network, this passive discovery method complements scans, agents, and API-based discovery to build a comprehensive asset inventory, calculate the TruRisk of everyRead More…

Phil Muncaster, guest writer at ESET talks about the heavy workloads and the spectre of personal liability for incidents that take a toll on security leaders, so much so that many of them look for the exits. What does this mean for corporate cyber-defenses?Read More…

Positive Technologies is constantly refining its approach to result-driven cybersecurity: as part of the bug bounty programme Positive Dream Hunting, security researchers worldwide can attempt to trigger two non-tolerable events. The first person who can inject malicious code into the company’s products or steal money from its accounts will be rewardedRead More…

In a strategic move to embrace cutting-edge technological solutions, Egypt’s Misr Italia Properties (MIP) is collaborating with cybersecurity firm CrowdStrike. The cooperation aims to fortify the cybersecurity infrastructure within MIP, ensuring the resilience of its information network and protecting customer and employee data against potential cyber threats or unauthorized access.Read More…