Security
-
Kyndryl Announces Cybersecurity Incident Response and Forensics Service
Kyndryl has unveiled a Cybersecurity Incident Response and Forensics (CSIRF) service to help customers proactively prepare for and respond to…
Read More » -
CyberKnight Partners With Citalid
CyberKnight has partnered with Citalid, a leading provider of solutions in the CRQ domain. According to the companies, the platform…
Read More » -
Data Security As a Discipline–What Organisations Must Do
Privacy has always been important for business, but in the last decade, it has gained far greater importance, especially after…
Read More » -
Ring Launches the Spotlight Cam Plus in the UAE
Ring has announced Spotlight Cam Plus, its next-generation Spotlight Cam featuring wide-angle 1080p HD video, built-in LED spotlights, and a…
Read More » -
Check Point Software Launches Infinity Spark to Protect Small and Medium Businesses
Check Point Software Technologies has today introduced Check Point Infinity Spark, a threat prevention solution that delivers AI security and…
Read More » -
Tenable Warns of Surge in Romance Scams
Romance scams are on the rise and Valentine’s Day is just one example of when these scams can significantly increase.…
Read More » -
Callsign Launches Dynamic Interventions to Tackle Authorized Push Payment Fraud
Callsign has announced its Dynamic Interventions capability controlled by its Orchestration Engine. This technology allows organizations to detect social engineering…
Read More » -
Corelight Launches Investigator for the MEA Region with Spire Solutions
Corelight has launched Corelight Investigator, a powerful solution that extends the power of open-source-driven network evidence to SOC teams everywhere,…
Read More » -
CPX Holding and Spire Solutions to Collaborate in Improving Organisations’ Cyber Maturity
CPX Holding, a UAE-based leading provider of digital-first cybersecurity solutions and services, and Spire Solutions, a leading cybersecurity solution provider…
Read More » -
Level up Your IT Security: All About Insider Threats
What do a disgruntled former employee and a vindictive associate with access to an organization’s critical data have in common?…
Read More »