Ashraf Sheet, Regional Director MEA at ‎Infoblox discusses how security trends such as IoT security, cloud security, NGDC security for SDN & NFV, CBSA security (cloud-based services and applications), and so on are becoming key and what cyber security strategies one needs to adopt this year.Read More…

The UAE’s Telecommunications Regulations Authority (TRA) has warned of malicious PDF files sent anonymously to email or WhatsApp accounts that incur heavy damage on electronic devices and smartphones.Read More…

Security researchers at Group-IB, a leader in preventing and investigating high-tech crimes and online fraud, have lifted the lid on a gang of Russian-speaking cybercrooks, dubbed MoneyTaker. Group-IB has confirmed 20 companies as MoneyTaker victims,Read More…

From online gaming, to mobile apps and wearable tech, technology is used at almost every touch point in people’s day-to-day lives. However, the downside of living in this hyper-connected society means that people are also extremely vulnerable to cyber-attacks. Harish Chib, Vice President -Middle East & Africa at Sophos discusses how malware isRead More…

Digital Shadows believes that whatever happens in 2018 and beyond, it is clear that cybercrime will continue to be a problem and present governments, businesses and individuals with challenges to protect their data and their intellectual property. Alastair Paterson, CEO and Co-Founder, Digital Shadows discusses how the threat landscape will look like over the next 12Read More…

The web is a dangerous place. And, according to SophosLabs encounters on average 30,000 new malicious URLs every day, and 60% of them are compromised, legitimate websites. Eighty-five percent of all malware, including viruses, worms, spyware, adware and Trojans, comes from the web. Further, the opportunities for criminal hackers are growing atRead More…

Brad Hibbert, Lead Solutions Strategist at BeyondTrust shares his ten recommendations that can help you can stop an attacker from penetrating your defences, slow them down, and/or detect them faster in order to mitigate the impact.Read More…

Henk Jan Spanjaard, Vice President of EMEA Sales at A10 Networks  discusses how threat actors are using IoT and connected devices to launch DDoS attacks and what can be done to shield enterprise data, applications and networks from such attacks. Read More…