Enterprise Security

Counting the cost of the biggest BEC attacks

Robust email protection is a necessity for protecting against one of the industry’s most sophisticated attack types; Business Email Compromise (BEC). Andrew Rose, Resident CISO, Proofpoint, offers some top tips...

For MSSPs XDR can be the foundation of effective ‘living security’

Vibin Shaju, Presales Director – EMEA, Trellix, discusses the value of extended detection and response (XDR) for managed security service providers (MSSPs). Two years on from our planetwide migration to the...

Axon Technologies launches Ethical Hacking and Penetration Testing online...

Axon Technologies, a UAE-headquartered information security solutions provider, has announced the launch of their virtual PEN 111: Network Ethical Hacking and Penetration Testing live online learning course, from June...

Trend Micro detected and blocked over 104 million threats in 2021 in UAE

Trend Micro Incorporated a global cybersecurity solutions provider, has released its 2021 annual cybersecurity report: Navigating New Frontiers. The report highlights the growing rate of cyber-attacks by malicious...

Checkmarx expert on taking a proactive approach to safeguard the development...

Savvy cyberattackers have turned their attention to the open source software supply chain as developers strive to innovate faster than ever, resulting in vulnerabilities. Shabir Bhat, Regional Sales Director, Middle...

Netskope CISO on leading a successful security transformation with Security...

In this interview with Intelligent CIO’s Jess Abell, Neil Thacker, EMEA and LATAM CISO for Netskope, highlights why traditional network security architecture is no longer fit for purpose, as well as why...

Browse our latest issue

Intelligent CIO Middle East

View Magazine Archive