Why the Education Sector Must Address Security in The Rush to Digitise
By Jacob Chacko Regional Business Head – Middle East, Saudi & South Africa (MESA) at HPE Aruba There has never been a greater need to connect students, classrooms, and buildings. […]
How Are Financial Services Firms Addressing the Requirements of Digital Transformation, Security, And Compliance?
By Ehab Halablab, Regional Sales Director – Middle East at A10 Networks The financial services sector is experiencing significant commercial disruption coupled with rapid innovation as established institutions strive to […]
Cybersecurity: Innovation Needed
Managing Complexity and Consistency, and Giving Users the Simplification, Automation, and Security They Want. By Laurence Pitt, Global Security Strategy Director, Juniper Networks Innovation is at the heart of cybersecurity […]
Why Organizations Need to Reduce Friction to Manage Remote Work Environments
The business world has changed and managing your endpoints is more important than ever By Jay Goodman, Strategic Product Marketing Manager, Automox The business world has changed and many of […]
Securing the Hybrid Workforce Begins with Three Crucial Steps
By Rick Vanover, Senior Director of Product Strategy, Veeam It is clear that remote working is here to stay. According to a survey conducted by Bayt.com, a leading job site […]
Video Intercom Systems Reinvent Building Security
By Melvin Braide, Content Writer Intercom systems have been around for decades, but recently access control solutions have started to incorporate video functionality, surveillance, and two-way calling. In this piece, […]
Nations—Not Individuals—Are After Your IP
By Ryan Benner, Anexinet A recent Wall Street Journal article titled, Russian Hackers Have Targeted 200 Groups Tied to U.S. Election, has Microsoft stating that “Russian government hackers have targeted […]
Magecart May Make Holidays Less Merry
Third-party plug-ins driving most retail sites can open doors to attackers by Mounir Hahad, Head of Juniper Threat Labs at Juniper Networks In the unprecedented year of 2020, the rise […]
How Blockchain Is Helping Stop the Spread of COVID-19
By Robert Galarza, CEO, TruTrace Technologies By now, we all know the cost of COVID-19. Many countries have struggled to contain the virus, forcing people to practice social distancing, wear […]
How to Keep Your Children Safe in Remote Learning Situations
By Nevin Markwart, Chief Information Security Officer at FutureVault For Cyber Security Magazine As parents, we have conflicting feelings on remote learning. One on hand, we want our children to […]
NCSAM Provided an Opportunity to Reset Our Approach to Cybersecurity
October marked National Cyber Security Awareness Month, but experts warn that cybersecurity requires attention 24/7/365 By Sam Humphries, Security Strategist, Exabeam Earlier this year in the rapid transition to a […]
Intelligent Protection Against DNS DDoS Attacks is Critical Part of Cybersecurity Architecture
By Ashraf Sheet, Regional Director, Middle East & Africa at Infoblox In 2020 DDoS attacks continue to increase both in volume and in frequency. Nexusguard Research[1] just reported a 542% increase […]
The One-Stop Spear Phishing Defense Guide You Will Ever Need
By Jeff Penner, Senior Manager at ActiveCo Technology Management. Is your business ready to combat spear phishing attacks? It’s a question that gives many seasoned CTOs bad jitters. The truth […]
How to Adapt Financial Services to The Online Space Securely – And Still Sleep at Night
Financial institutions, like eCommerce industries, are leading today’s fast, pandemic-driven transition to the digital space. A change that will become a norm. By Robert Capps, VP of Marketplace, NuData, a […]
Emerging Technologies Create A New Line of Defense in The Fight Against Fraud
ARTIFICIAL INTELLIGENCE POWERS VOICE BIOMETRICS FOR A MORE SECURE, FRICTIONLESS CUSTOMER EXPERIENCE By Brett Beranek, Vice President and General Manager, Security, and Biometrics, Nuance Communications A growing number of organizations […]
Mitigating the Pitfalls of Onedrive Security
By Veniamin Simonov, Director of Product Management, at NAKIVO Inc. With COVID-19 triggering a potential long-term shift to working from home, SecOps teams are coming under increasing pressure to keep […]
Takeaway from the SANS Institute Attack: Without Proper Care, “Consent Phishing” Can Happen to Anyone
Gamified Training for Security Teams Can Raise Vigilance and Advance Skills to Defend Against the Latest Attack Exploits. By Chloé Messdaghi, VP of Strategy, Point3 Security The SANS Institute, established […]
Perfecting Your Cybersecurity Sales Process
By Katie Teitler, Senior Analyst, TAG Cyber How Is Your Cyber Security Sales Process? Sales has been around since the dawn of tradesmanship. Even before the term was codified, heck, […]
The Impact of Ransomware on Cloud Services and How to Stop Attacks
By Davit Asatryan, Product Manager, Spin Technology Cloud technology and services continue to gain popularity due to their ability to allow businesses to cut costs, improve an outdated IT infrastructure, […]
How COVID Tests the Resilience of Your Cloud Data Infrastructure
By Noah Johnson, Co-founder & CTO, Dasera In recent years, we’ve seen a massive shift as companies eliminate the physical restraints of IT infrastructure and its users by moving to […]
Ransomware Is Evolving
These attacks thrive on overprovisioned administrator access. Understanding where data resides, and adopting zero standing privilege is key. By Jeff Warren, General Manager, Products, Stealthbits Technologies, Inc. When most people […]
3 Educational Cyber Security Steps for The Protection of Your Personal Data
By Ankit Rajpurohit Data protection on the Internet Our data is collected, stored, analyzed, sold, and exchanged like never before. And we should not forget that they are often stolen […]
In the Midst of the Pandemic, Cybersecurity Professionals Show an Uptick in Job, Salary Satisfaction Despite High Stress Levels
By Samantha Humphries, security strategist, Exabeam Interested in a career in cybersecurity — or are you wondering what your peers in the space are thinking? Exabeam’s 2020 Cybersecurity Professionals Salary, […]
Changing Cybersecurity Culture One Habit at A Time
By George Finney, Chief Security Officer for Southern Methodist University and Author of Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future My first job out of college […]
4 Reasons Why Cyber Security Is Important in Your Business
By Gabe Nelson, Content Specialist, Bonus.ly Cyber-attacks are incredibly common and anyone can fall victim to them. Cyber-attacks can cause electrical blackouts, failure of military equipment, and breaches of national […]
The Impact Of Blockchain & Crypto On Cyber Security
By Jesús Cedeño, Senior Editor, cryptocoinsociety.com These days many people (especially if they’re more or less tech-oriented) have heard about cryptocurrencies and blockchains. Even if they don’t fully understand these […]
Defending Ever Expanding Networks and IT Systems
Architecture at Scale is Needed By Trevor Pott, Product Marketing Director, Juniper Networks How many systems must an information security professional defend? For most people, the numbers involved are abstract […]
Measuring Cybersecurity Systems Durability
By Joseph Kirkpatrick, President, Kirkpatrick Price Developing sound cybersecurity systems is a complex, multi-faceted task– but a crucial one. Not only do these systems help businesses meet their regulatory requirements, […]
The Limitations of SASE and Zero Trust
By Jayant Shukla, CTO, and Co-Founder, K2 Cyber Security Over the past several years, two industry buzz terms have really started to gain traction. SASE (Secure Access Service Edge) was […]
Under the SASE Hood: Key Components to Delivering Frictionless, Cloud-Native Security
Under the SASE Hood: Key Components to Delivering Frictionless, Cloud-Native Security By Kaushik Narayan, CTO Cloud Business Unit, McAfee While cloud services deliver on promised savings and convenience, they still […]