Enterprise Security

Securing the endpoint

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoints can include...

How to secure the endpoint

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoints can include...

Proactively preventing cyberattacks and keeping the business operational with...

Sameer Basha, Security Consultant GCC, Check Point Software Technologies – Middle East, discusses the importance of using threat hunting to defend against attackers on a network, as well as how threat hunting is...

IBM Security report: Pandemic digital habits causing security risks for...

IBM Security has announced the results of a global survey examining consumers’ digital behaviours during the pandemic, as well as their long-term impact on cybersecurity. With society becoming increasingly...

Tenable research finds serious vulnerability in Microsoft Teams

Tenable has disclosed details of a serious vulnerability in Microsoft Teams discovered by its Zero-Day Research Team. By abusing PowerApps functionality (a separate product used within Teams for building and using...

KSA teams up with Black Hat organisers to launch world-class hacking event...

The Kingdom of Saudi Arabia (KSA) will make a bold entry onto the global tech stage later this year with a ground-breaking, mega cybersecurity event that will bring together the world’s best hackers and trainers...

Browse our latest issue

Intelligent CIO Middle East

View Magazine Archive