Magazine Button

Blogs

Dell EMC expert on how to transform the workplace productivity

Mohammed Amin, Senior Vice President, Middle East, Turkey and Africa at Dell EMC, believes we are about to become immersed in a world of ‘smart living’ at home and ‘intelligent working’ in the workplace as we embark on the next era of human machine partnerships. Here he makes some insightful predictions not just about the […]


Powerful data is shared data – conquering the silo sprawl

James Petter, VP, EMEA at Pure Storage argues that, if organisations are to innovate and survive in a business environment that is increasingly data-driven, they must design their IT infrastructure with data in mind and have complete, real-time access to that data. According to IDC, spending on data-intensive AI systems in the Middle East and […]


Cybercrimes: An increasing area of crime in the modern world…

By Mariam Al Hassani – CIT (UAEU). Cybercrime is on the rise and its activities know no boundaries. The convenience and the speed of the internet are being exploited to commit serious crimes that threaten victims the world over. These internet related crimes take many forms ranging from attacks on social media accounts, theft and […]


Cisco expert on building and securing 5G networks of tomorrow

While 5G brings the promise of new revenue opportunities for service providers, new infrastructure and use cases will create new risks. And according to Ali Amer, Managing Director, Global Service Provider Sales, Cisco Middle East and Africa, the security of the SP network infrastructure, their business, and their customers will require a holistic approach. Every new generation […]


‘Zero trust security approach is gaining acceptance’: Centrify expert

Organisations are coming to realise that merely a user a user name and password are not enough to secure their cyber existence. And as Kamel Heus, Regional Manager – MEA at Centrify explains, a ‘zero trust security approach’ is increasingly gaining acceptance. The concept of zero trust is as profound in cybersecurity as the sweeping […]


How to have an effective incident response

Morey Haber, Chief Technology Officer at BeyondTrust, looks at what companies can have in place so they are fully prepared for any disasters. As a security professional, I have seen a wide variety of best practices for incident response. The methodologies vary greatly based on the sensitivity of the data and requirements to notify law […]


The top five identity trends of the year

Jim Ducharme, RSA Security’s VP of Identity Products The days where passwords and tokens were our only way of identifying people and systems is long gone. Today, we have a vast array of technologies, including: multi-factor authentication (MFA), standards-based solutions, biometrics and smartphone-based authentication – to name just a few. This change has been driven […]


Ransomware: An action plan – by Steven Malone of Mimecast

Steven Malone, Director of Security Product Management at Mimecast, talks us through an action plan to improve your cyber resilience. The global reach and considerable impact of the WannaCrypt (WannaCry/Wcry) ransomware is a wake-up call for organisations and governments around the world. This on-going cyber threat will continue to adapt to take advantage of weaknesses […]


WannaCry attacks qualify as virus disaster many times over

Over a dozen years ago, malware pioneer Dr Peter Tippett coined the expression virus disaster, which describes the point at which more than 25 machines are infected on a single network as the tipping point for complete shutdown of a network. The new ransomware WannaCry, which locks down all files on an infected computer until […]


Help AG releases advisory on WannaCry ransomware threat

On 12th May, a mass ransomware attacked started hitting hospitals, telecom service providers, universities and other institutions worldwide, using the malware WannaCry, WanaCrypt0r 2.0. It is found to be perpetrated by exploiting a known flaw in Microsoft Windows SMB Server, MS17-010. Given the nature of its impact, all organisations should consider this as high risk […]


WannaCry just showed why healthcare is lagging in security

Healthcare is an industry under siege. This statement was true yesterday and was underscored by the massive ransomware attack. Care providers are targeted by cybercriminals with greater frequency than any other organisation. And thanks to old equipment and flagging security standards, these attacks find success far more often than they should. Security is no longer […]


WannaCry and why it has wrecked so many businesses

This week’s attacks leveraging the WannaCry ransomware were the first time we have seen an attack combine worm tactics along with the business model of ransomware. The weaponisation of the EternalBlue exploit made public weeks ago, and unpatched MS-17-010 Windows OS vulnerabilities by the thousands enabled WannaCry to infect hundreds of thousands of computers, across […]


Browse our latest issue

Magazine Cover

View Magazine Archive