The gap in cyber defenses
As Dubai is moving towards becoming one of the smartest cities in the world based on IoT and creating a ministerial post for AI, the need for cybersecurity is more pressing than ever.Read More…
As Dubai is moving towards becoming one of the smartest cities in the world based on IoT and creating a ministerial post for AI, the need for cybersecurity is more pressing than ever.Read More…
KPMG in Bahrain, is hosting an educational seminar to shed light on the role of Internal Audit in preventing and addressing cyber-threats. The seminar, titled “Why cybersecurityRead More…
Kaspersky Lab, in partnership with Active Education, has embarked on a series of interactive cybersecurity performances at selected schools in Dubai. The events are aimed at driving top of mind awareness around online safety. The performances, aimed at children aged 8-13, cover key threats that children are vulnerable to online. ThisRead More…
Sophos today announced its SophosLabs 2018 Malware Forecast, a report that recaps ransomware and other cybersecurity trends based on data collected from Sophos customer computers worldwide during April 1 to Oct. 3, 2017. One key finding shows that while ransomware predominately attacked Windows systems in the last six months, Android, Linux andRead More…
Cloud adoption in the region is presently at a nascent stage, but steadily on the rise. Organizations in the Middle East are rapidly adopting cloud strategies, which include deploying business applications on public, private, or hybrid clouds.Read More…
BlackBerry recently introduced the new cybersecurity consulting services aimed at enabling enterprise GDPR compliance and mitigating security risks in connected automobiles that threaten personal and public safety. General Data Protection Regulation (GDPR) Set to go into effect May 2018, and applicable to any enterprise controlling or processing Personally Identifiable InformationRead More…
Fortinet, a leader in high-performance cybersecurity solutions, urges caution regarding a new Bluetooth exploit, known as BlueBorne, that has been discovered to exploit a number of Bluetooth vulnerabilitiesRead More…
BeyondTrust PowerBroker solutions for Server Privilege Management and Endpoint Least Privilege management enable you to disrupt all stages of the cyber attack chain.Read More…
Copyright © 2023 - Zarks Media. All rights reserved