Security
-
HID Throws the Spotlight on Cloud-Based Access Control Tech
What did you showcase at Intersec 2020? At Intersec 2020, we focused on HID Origo, a cloud platform to help…
Read More » -
Cyber Attacks to Increase on Valentine’s Day
Valentine’s Day presents an opportunity for threat actors to target both consumers and retailers with cyber-related romance scams. Argos’ fake…
Read More » -
Threat Actors Pivot Toward More Targeted Attacks, Evasive Exploits: SonicWall
SonicWall has announced its annual threat report findings, which highlight the evasive tactics cybercriminals leverage to target businesses and consumers.…
Read More » -
SD-WAN Needs to Integrate Network and Security Functionality
The one common drawback to most SD-WAN solutions is that they address your WAN connectivity needs as if they exist in isolation.…
Read More » -
Insider Threats Cost Organizations in the Middle East $11.65 Million Annually
Proofpoint has released its Cost of Insider Threats 2020 Global Report to identify the costs and trends associated with negligent,…
Read More » -
Flaws in Apple’s Privacy Tool Could Enable Tracking
An anti-tracking tool baked into Apple’s Safari web browser was found to contain flaws that, if abused, could enable the…
Read More » -
Malware Disguised as Billie Eilish Attacks UAE Users
Cybercriminals are actively abusing the names of artists and songs nominated for a Grammy 2020 award, in order to spread…
Read More » -
CyberKnight Launches its Operations to Accelerate Incident Response Capabilities in the Middle East
CyberKnight Technologies hosted an official reception to announce the launch of its operations in the Middle East. The event took…
Read More » -
Why Organisations Can No Longer Ignore Zero Trust
The recent Gartner Security and Risk Management Summit held in Dubai, UAE revealed that the Middle East and North Africa…
Read More »
