Shadow Iot Devices A Major Concern for Corporate Networks
By Ashraf Sheet, Regional Director Middle East & Africa at Infoblox Infoblox Inc., the leader in Secure Cloud-Managed Network Services, today announced new research that exposes the significant threat posed […]
Network Security Must Keep Up with Video Surveillance Systems’ Rise in Criticality to Public Safety and Security in The Middle East
By Rabih Itani, the Middle East region security business head at Aruba, a Hewlett Packard Enterprise company The Video Surveillance market in the Middle East region continues to grow in […]
The Gap in Security – Data Centric Security
By Eric Rickard, CEO, Sertainty Federal Systems What do the Coronavirus pandemic, 9/11 terrorist attacks, Boeing 737 MAX crashes, and the OPM data breach have in common? First, their root […]
VPNs – 2020 And Beyond
By Sebastian Schaub, Founder and CEO, hide.me In the last 5 years, awareness to protect data, to encrypt communication, and minimize data collection has rapidly increased. Privacy and trust will […]
Malware – A Cyber Threat for 2020
By Pedro Tavares, Founder of CSIRT.UBI & Editor-in-Chief seguranca-informatica.pt We are facing a transition to a new decade. The maturity in the field of cybersecurity is growing, but a wave […]
Predicting the Direction of The PAM Market In 2020
A Look at What is Next on the Horizon for Securing Organizations’ Privileged Accounts By James Legg, President, and CEO, Thycotic As each year passes, we analyze the successes and […]
Cyber Defense and Cultural Heritage
By Milica D. Djekic Let’s look back several centuries in the past and try to imagine what technologies the people of that time might have used in their lives. If […]
Analysing Data Using the Intelligence Cycle: An Overview
By Alan Blaney, Managing Director of Focus Training When it comes to analyzing different forms of intelligence, using a detailed and coherent process is crucial in order to determine the […]
Drowning in A Sea of Threat Data? Consider A Curator
By Rodney Joffe, Senior Vice President, Senior Technologist and Fellow, Neustar In the wake of increasing cybersecurity threats and data breaches, a whole host of network monitoring and threat intelligence […]
Time Is of The Essence
Combating False Alarms and Delayed Detection Is Key to Defeating Advanced Cyber Threats By Filip Truta, Information Security Analyst, Bitdefender Keeping your organization safe from cyber threats drains considerable resources […]
Juggling Your Clouds
Managing the Federal Government’s Multi-Cloud Future By Cameron Chehreh, Chief Technology Officer, Dell Technologies Federal Driven by the recent Cloud Smart initiative, federal agencies are prioritizing cloud and on track […]
Devops – Are You Risking Security for Agility?
By Morey Haber, CTO & CISO, BeyondTrust By merging software development and IT operations ― two traditionally mutually exclusive functions ― DevOps has fundamentally transformed how today’s organizations develop, operate […]
Mastering Automation to Solve Data Security for Healthcare Practices
If the Biggest Organizations Can’t Keep Our Data Safe, Then How Can a Small One? By Anne Genge, CEO, Alexio Corporation One of the greatest challenges of 21st-century is cyber-security. […]
Why Zero Trust Isn’t So Trustworthy
By Benny Lakunishok, CEO and co-founder of Zero Networks Everyone agrees a zero-trust network model is an optimal way to protect your network. But can you really reach that goal […]
How The Cybersecurity Industry Can Stop Shooting Itself In The Foot And Solve The Skills Gap
By Rene Kolga, Head of Product, Nyotron. It’s no secret that enterprises struggle to find the skilled personnel they need to properly secure their IT systems and protect sensitive information […]
The Importance of Cybersecurity Education in The Workplace
By Aman Johal, Lawyer, and Director of Your Lawyers In the last few years, we have seen unprecedented levels of data breach activity, with cybersecurity attacks compromising the personal data […]
Building Your Cyber Talent Pool Early In 2020
Start early to win the war on talent By Karl Sharman, Vice-President, BeecherMadden As we near the end of the first quarter in 2020, you should have a strong idea […]
How The Cybersecurity Industry Can Stop Shooting Itself In The Foot And Solve The Skills Gap
By Rene Kolga, Head of Product, Nyotron. It’s no secret that enterprises struggle to find the skilled personnel they need to properly secure their IT systems and protect sensitive information […]
Data Protection Day 2020: De-Risking in The Era of Transparency
By Daniel Fried, General Manager (GM) and Senior Vice President (SVP), EMEA and Worldwide Channels, Veeam The issue of data protection and privacy was, until recently, a conversation confined to […]
The Public Cloud. Is It Secure?
GTB Technologies, Inc. The Data Protection Company In today’s business environment, data is everything. With data volumes increasing exponentially, the cloud has become the go-to for many companies to store […]
The Secret to Winning IT Security Roulette
By Thomas Hatch Cybersecurity can oftentimes feel like you’re playing roulette. It can also feel like a long night in the casino where the longer you stay, the more likely […]
Protect Yourself from Threats and Fraud With XTN
By Guido Ronchetti, CTO of XTN Cognitive Security XTN develops Behavioral-based Fraud and Threat Protection solutions designed to defend digital businesses. Our security solutions are Cognitive, using proprietary AI algorithms. We also […]
Threat Modeling High Value Assets
By M. Michael Mitama, THETA432 We live in an era where we are continuously bombarded with marketing campaigns of the next silver-bullet that will stop “The Threat”. Overcompensation on malware […]
RSA Conference 2020 – What’s Keeping Cybersecurity Experts Up At Night?
San Francisco, CA – At the RSA Conference 2020, Gary Berman and I had the privilege of interviewing some of the top executives in the cybersecurity Community about what concerns […]
TEHTRIS XDR Platform, A Holistic Cybersecurity Solution
By Laurent Oudot, Founder, CEO at TEHTRIS TEHTRIS is the European cybersecurity company that has designed and deployed the smart and holistic TEHTRIS XDR Platform in more than 50 countries […]
Thought Leaders Discuss the “Human Element” at RSA Conference 2020
San Francisco, CA. – The theme at RSA Conference 2020 focused on “The Human Element,” highlighting the current trend toward focusing on end-user experience, vulnerability, and empowerment throughout the InfoSec […]
Enterprises Demand MSSPs Offering MDR Services Through Cybersecurity Convergence
By Arun Gandhi, Director of Product Management of the Seceon Enterprises from all verticals are embracing digital transformation. This new, increasingly connected digital world is bringing tremendous efficiencies to the […]
Cross Domain Solutions – Quo Vadis
By Alexander Schellong, VP Global Business, INFODAS Highly sensitive systems and data assets (domains) are often separated from the Internet or less critical systems. Separation is achieved through isolation, commonly […]
Coronavirus scams, found and explained
By David Ruiz Coronavirus has changed the face of the world, restricting countless individuals from dining at restaurants, working from cafes, and visiting their loved ones. But for cybercriminals, this […]
Demystifying Network Investigations with Packet Data
By Michael Morris, Director of Global Technologies Alliances and Business Development, Endace A common challenge for security analysts, network operations and application teams is lacking the right data to troubleshoot […]