Intelligent Enterprise Security
Yahoo most impersonated brand in Q4 2022 phishing attacks
Check Point Research (CPR), the Threat Intelligence arm of Check Point Software Technologies, a leading provider of cybersecurity solutions globally, has published its Brand Phishing Report for Q4 2022. The report highlights the brands that were most frequently imitated by cybercriminals in...
Simplifying security on the path to a multi-cloud future
CIOs and CISOs must shift their mindset from network-centric security to data-centric security in order to have visibility over their data, says Petko Stoyanov, Global Chief Technology Officer at Forcepoint. He examines why this is important and offers some best practice advice for...
Imperva discovers vulnerability affecting 2.5 billion Chrome users
Imperva, a leader in the digital security space, has revealed a new vulnerability dubbed CVE-2022-40764. Discovered by Imperva’s Threat Research Team, it has been found to affect more than 2.5 billion users of Google Chrome and Chromium-based browsers. The vulnerability is based on the way...
PRODATA partners with Malwarebytes to effectively combat regional cyberthreats
Malwarebytes, a global leader in real-time cyber protection, has intensified its partnership with PRODATA, an established IT marketing and value-added distributor since 1992 across the African Continent and Europe, to bring industry-leading cloud-based security and cyber protection solutions to...
Features
Expert advice for layering up your defences this World Password Day
The annual World Password Day raises awareness of the importance of having robust and resilient password hygiene practices in place. We...
The changeable network security landscape
Network security is a vital capability that enables the business to evolve through digital innovation – an effective strategy with...
Trends expected to develop in the cybersecurity space in 2022
2021 has been a year of widespread uncertainty across the globe, especially for those in the cybersecurity space as cybercriminals ramped...
Embracing the work from anywhere model
Finally, there is a light at the end of the pandemic tunnel. As countries get closer to the easing of lockdowns and social restrictions,...
Insights
Simplifying security on the path to a multi-cloud future
CIOs and CISOs must shift their mindset from network-centric security to data-centric security in order to have visibility over their...
Three signs your cybersecurity posture will not protect you from the modern threat...
Figures have shown that the number of cyber-incidents are rapidly increasing. Gregg Petersen, Regional Director – MEA at Cohesity,...
Agile IT: The role of the CISO in combatting the risks of the ‘move fast, fail fast’ cul...
Agile IT must be implemented with due caution, says Taj El-khayat, Managing Director – South EMEA at Vectra AI. Here he discusses...
Counting the cost of the biggest BEC attacks
Robust email protection is a necessity for protecting against one of the industry’s most sophisticated attack types; Business Email...
Case Studies
Oriental Weavers rolls out SD-WAN for elevated customer service levels
Egypt-based Oriental Weavers one of the world’s largest carpet producers recently rolled out SD-WAN in record time for elevated...