Expert Speak
-
Office 365 Threats and Inversion of the Corporate Network
Written by Oliver Tavakoli, CTO, Vectra AI 2020 presented a tidal wave of challenges for businesses in every sector —…
Read More » -
Defining Hybrid Networks and How to Secure it
Written by John Madisson, EVP of Products and CMO at Fortinet Organizations have distributed data and workloads across both cloud environments…
Read More » -
Top Predictions for Service Provider Networks for 2021
Written by Hasan Darwish, Regional Sales Manager for Gulf at A10 Networks 2020 has been a challenging year for the…
Read More » -
How Effective is Threat Hunting for Organisations?
Written by Anthony Perridge, VP International, ThreatQuotient In recent years threat hunting has become much more widely adopted, but today…
Read More » -
Protecting Human Rights in the Era of Cyber Information Warfare
Written by Edwin Weijdema, Global Technologist, Product Strategy at Veeam Disinformation is undermining the limitless potential of technology to be…
Read More » -
In Focus: Data Privacy and Protection in the Information Age
Written by Antoine Harb, Team Leader Middle East, and North Africa at Kingston Technology Huge quantities of personal and corporate…
Read More » -
Thousands of Stolen Passwords End up on the Internet, says Check Point
Cyber-crime is a complex landscape, but when it comes to actually launching cyber-attacks, there are three main techniques that criminals…
Read More » -
Digital Transformation and Cloud Integral in Post Pandemic World
In the post-pandemic world, digital transformation and cloud are now mainstream, with one disruptive, while the other superbly cost-effective. Rohit…
Read More » -
How Technology Will Help to Shape the Future of Work in the Middle East in 2021 and Beyond
Written by Thierry Nicault, Regional Vice-President, Middle East, and Africa, Salesforce No one could have predicted what 2020 would bring.…
Read More » -
PayPal Users Targeted in New SMS Phishing Campaign
Written by Amer Owaida, the security writer at ESET A new SMS-based phishing campaign is doing the rounds that attempts…
Read More »