Brand

Insights

Red Hat expert on the top five ways that DevSecOps isn’t like sport

Mike Bursell, Chief Security Architect, Red Hat, discusses the similarities – and big differences – between DevSecOps and sport. There’s the World Cup, cricket, baseball, rugby, Wimbledon – more sport around at the moment than you can shake a stick (or bat, racket or croquet mallet) at. I love watching various sports – an activity […]


Attackers could use heat traces left on keyboard to steal passwords

Tomas Foltyn, Security Writer at ESET, outlines details of an attack called ‘Thermanator’, which could use your body heat against you in order to steal your credentials or any other short string of text that you have typed on a computer keyboard. A team of academics from the University of California, Irvine (UCI), have presented […]


Sophos expert on how to identify and avoid phishing scams

Phishing might be one of the oldest tricks in the books for cybercriminals but it remains a significant threat, with sophisticated new attack methods constantly emerging. Harish Chib, Vice President, Middle East and Africa, Sophos, outlines some of the current trends and offers some advice to help businesses and organisations protect themselves against the scam. […]


Applying threat intelligence to secure the enterprise network

By Ashraf Sheet, Regional Director, Middle East and Africa at Infoblox In a world in which cybercriminals are becoming increasingly stealthy and using increasingly sophisticated techniques, from ransomware to DNS hijacking, it is becoming more difficult, more expensive and less effective for businesses alone to defend themselves against threats. According to research recently carried out […]


Fortinet expert discusses the rise of destructive botnets

By Kalle Bjorn, Director – Systems Engineering, Fortinet Over the past few years, we have watched the rise of ransomware as it successfully targeted a variety of vertical markets, especially healthcare, education and financial services. And like almost all malware, it has also begun to evolve. For example, the WannaCry ransomware engine has recently been modified to support […]


SANS Internet Storm Center analyses spread of router attacks

Johannes Ullrich, Dean of Research at SANS Institute and founder of the Internet Storm Center, discusses the cyber-risk to routers and the trends his team has seen in the Middle East.  These days, any unprotected or inadequately protected device exposed to the Internet is at risk of attack from cybercriminals. This includes routers that businesses […]


Equinix expert on how organisations can best secure their data

There is always the threat that losing your company’s data will bring your business to a close. Not only is the cyberattack landscape increasing in frequency, scale and complexity but the cost of trying to recover from an attack is growing astronomically as well. A recent IBM Security and Ponemon Institute global study showed the […]


World Cup scams: how to avoid an own goal

Tomas Foltyn, Security Writer at ESET, says that, whether travelling to enjoy the matches in person, or watching from home, fans should be on the lookout for foul play when it comes to the FIFA World Cup. Have you been looking forward to the 2018 FIFA World Cup? So have scammers and they’re kicking it […]


Get to know: Sébastien Pavie, cybersecurity expert at Gemalto

On the lighter side of things we ask the industry experts what makes them tick. Here we speak to Sébastien Pavie, Regional Director META, Enterprise and Cybersecurity, at Gemalto. What would you describe as your most memorable achievement? Almost nine years ago now, I convinced the senior management of my company at the time to open an […]


Unified defence is the best approach, expert argues

Mohammad Jamal Tabbara, Senior Systems Engineer – UAE and Channel at Infoblox, says organisations should not be fooled into thinking there is a ‘silver bullet’ for preventing cyberattacks but instead look to implement a ‘unified defence’. Enterprises of all sizes are falling victim to very determined malicious actors whose motivations range from financial gain to […]