Blogs

Cybercrimes: An increasing area of crime in the modern world…

By Mariam Al Hassani – CIT (UAEU). Cybercrime is on the rise and its activities know no boundaries. The convenience and the speed of the internet are being exploited to commit serious crimes that threaten victims the w...

Cisco expert on building and securing 5G networks of tomorrow

While 5G brings the promise of new revenue opportunities for service providers, new infrastructure and use cases will create new risks. And according to Ali Amer, Managing Director, Global Service Provider...

How to have an effective incident response

Morey Haber, Chief Technology Officer at BeyondTrust, looks at what companies can have in place so they are fully prepared for any disasters. As a security professional, I have seen a wide variety of best practices...

The top five identity trends of the year

Jim Ducharme, RSA Security’s VP of Identity Products The days where passwords and tokens were our only way of identifying people and systems is long gone. Today, we have a vast array of technologies, including: m...

Ransomware: An action plan – by Steven Malone of Mimecast

Steven Malone, Director of Security Product Management at Mimecast, talks us through an action plan to improve your cyber resilience. The global reach and considerable impact of the WannaCrypt (WannaCry/Wcry)...

WannaCry attacks qualify as virus disaster many times over

Over a dozen years ago, malware pioneer Dr Peter Tippett coined the expression virus disaster, which describes the point at which more than 25 machines are infected on a single network as the tipping point for...

Browse our latest issue

Intelligent CIO Middle East

View Magazine Archive