Brand

Insights

Simplifying data management and storage in a ‘Connected Everything’ world

Article by: Eran Brown, EMEA CTO, INFINIDAT We’re moving rapidly towards a completely connected world, with approximately 75 billion connected devices expected to be in use globally by 2025, according to Statista. Organisations are recognising the opportunities offered by the Internet of Things (IoT) and Machine to Machine (M2M) communication, which is driven by the […]


How to protect customer experience in the face of perpetual innovation

Article by: Michael Allen, VP and EMEA CTO, Dynatrace Over the past decade, the speed of digital innovation has been supercharged. Companies are now on a constant treadmill of pushing software updates to improve the customer experience and offer new functionality for users. This system of perpetual innovation is a crucial part of a business […]


Protecting businesses from potential catastrophic risks

Mohamad Rizk, Manager System Engineers, Middle East at Veeam, looks at how companies need a recovery plan in the event of disasters happening. Unpredictability is a fact of life, and nature brings plenty of it. Be it flooding, fire or even earthquakes and hurricanes, businesses worldwide can be susceptible to a whole range of natural […]


From hype to reality: Paladion expert on AI in cybersecurity

Jose Varghese, EVP and HEAD – MDR Services at Paladion, explores AI and the role it will continue to play in combating modern cyberthreats. Artificial Intelligence (AI) in cybersecurity has recently made several headlines. These headlines make seasoned cybersecurity professionals wary. We’ve seen other emerging technologies receive similar attention and we’ve seen many of them […]


Red Hat expert on the top five ways that DevSecOps isn’t like sport

Mike Bursell, Chief Security Architect, Red Hat, discusses the similarities – and big differences – between DevSecOps and sport. There’s the World Cup, cricket, baseball, rugby, Wimbledon – more sport around at the moment than you can shake a stick (or bat, racket or croquet mallet) at. I love watching various sports – an activity […]


Attackers could use heat traces left on keyboard to steal passwords

Tomas Foltyn, Security Writer at ESET, outlines details of an attack called ‘Thermanator’, which could use your body heat against you in order to steal your credentials or any other short string of text that you have typed on a computer keyboard. A team of academics from the University of California, Irvine (UCI), have presented […]


Sophos expert on how to identify and avoid phishing scams

Phishing might be one of the oldest tricks in the books for cybercriminals but it remains a significant threat, with sophisticated new attack methods constantly emerging. Harish Chib, Vice President, Middle East and Africa, Sophos, outlines some of the current trends and offers some advice to help businesses and organisations protect themselves against the scam. […]


Applying threat intelligence to secure the enterprise network

By Ashraf Sheet, Regional Director, Middle East and Africa at Infoblox In a world in which cybercriminals are becoming increasingly stealthy and using increasingly sophisticated techniques, from ransomware to DNS hijacking, it is becoming more difficult, more expensive and less effective for businesses alone to defend themselves against threats. According to research recently carried out […]


Fortinet expert discusses the rise of destructive botnets

By Kalle Bjorn, Director – Systems Engineering, Fortinet Over the past few years, we have watched the rise of ransomware as it successfully targeted a variety of vertical markets, especially healthcare, education and financial services. And like almost all malware, it has also begun to evolve. For example, the WannaCry ransomware engine has recently been modified to support […]


SANS Internet Storm Center analyses spread of router attacks

Johannes Ullrich, Dean of Research at SANS Institute and founder of the Internet Storm Center, discusses the cyber-risk to routers and the trends his team has seen in the Middle East.  These days, any unprotected or inadequately protected device exposed to the Internet is at risk of attack from cybercriminals. This includes routers that businesses […]