BeyondTrust expert on how to have an effective incident response

Morey Haber, Chief Technology Officer at BeyondTrust, looks at what companies can have in place so they are fully prepared for any disasters. As a security professional, I have seen a wide variety of best practices for incident response. The methodologies vary greatly based on the sensitivity of the data and requirements to notify law […]

How AI-based machine learning could affect IT security

By Rabih Itani, Regional Business Development Manager – Security, Middle East and Turkey at Aruba, a Hewlett Packard Enterprise company. Artificial intelligence (AI) has been a hot topic of discussion in many industries for a while now, with healthcare, retail and hospitality (to name but a few) starting to speculate on the massive opportunities its […]

The tricks cybercriminals are using to hide in your phone

  Malware in the official Google store never stops appearing – it is a ‘huge victory’ for cybercriminals to sneak their malicious applications into the marketplace of genuine apps. Denise Giusto Bilić, Security Researcher at ESET, summarises some of the common behaviours of malicious Android code over the last few years. Deceit based on social […]

Hybrid approach to security needed for maximum protection, expert says

Despite the popularity of SaaS security solutions, Ashraf Sheet, Regional Director Middle East and Africa at ‎Infoblox, argues that a hybrid approach is the best prevention against cyberattacks. Are Software-as-a-Solution (SaaS) security solutions truly the panacea they are publicised to be? The answer is, it depends on how the SaaS solution is architected. A majority […]

Oracle spokesman on why Egypt is one of the company’s top markets

The journey to cloud isn’t a one-way path – each company’s journey is unique. Abdul Rahman Al Thehaiban, Senior Vice President (Technology), Middle East and Africa, Oracle, explains why Egypt is one of the company’s top markets. “At Oracle, we have built a completely integrated cloud platform that spans all layers of the cloud and […]

The top five identity trends of the year

Jim Ducharme, RSA Security’s VP of Identity Products The days where passwords and tokens were our only way of identifying people and systems is long gone. Today, we have a vast array of technologies, including: multi-factor authentication (MFA), standards-based solutions, biometrics and smartphone-based authentication – to name just a few. This change has been driven […]

Harish Chib, from Sophos, on expected rise in ransomware

What can we do about the expected increase in ransomware and cyber-extortion tools? By Harish Chib, Vice president, Middle East & Africa, Sophos. Understanding why Ransomware attacks are so successful, implementing advanced ransomware combating protection in every stage of an attack and following good IT security practices, including regular training for employees are essential components […]

Secureworks expert predicts cybersecurity landscape of 2018

With the new year upon us our thoughts turn to what will happen to the security landscape over the next 12 months. Mahmoud Mounir, regional director of Secureworks, gives us his predictions for the cybersecurity landscape of 2018. As the new year begins, cyber threats such as ransomware will continue to pose a serious threat […]

Remotely protect and control your data with Seclore 3.0

Seclore is one of the pioneers in the EDRM (Enterprise Digital Rights Management) space. The company has recently launched their new product version, Seclore 3.0. Intelligent CIO caught up with Rohit Oberoi, Director Channel Sales – India, Middle East and Africa, to discuss the product launch and how Seclore is helping companies to secure collaboration […]

SecureWorks talks ransomware, cyber fraud and social engineering

Intelligent CIO caught up with Gopan Sivasankaran, SecureWorks’ Security Architect at this year’s GITEX Technology Week to discuss the evolving cyberthreats targeting organisations, and individuals, today. Q: What is SecureWorks focusing on this year at GITEX? A: This is the first GITEX as part of the Dell Technology family as such with all organisations within […]