Magazine Button
 
 

Help AG partners with Mimecast to help address email security threats

Recognising the growing popularity of cloud-based email platforms such as Office 365 and Google Apps in the region, Help AG, a leading information security services, consultancy and solutions provider in the Middle East, has signed a reseller agreement with Mimecast. The channel partnership is designed to enable Help AG to offer the vendor’s leading email risk management and data security solutions to businesses via a single, integrated subscription service. In...

Read More

Oracle expert on how Nigerian businesses can be secure in the cloud

Cloud technology has opened up numerous opportunities for businesses but there are some concerns about the level of security it offers. Adebayo Sanni, MD of Oracle Nigeria, looks at how businesses can stay secure while leveraging the benefits of the cloud. High-profile breaches have propelled security to the top of the agenda at many organisations as the combination of faster, more-damaging attacks, increasingly complex technology environments and demanding regulatory requirements...

Read More

Security Serious Unsung Heroes Awards 2018 winners revealed

The third annual Security Serious Unsung Heroes Awards winners were revealed  in a fun and inspiring celebration at St Bart’s Brewery in London. The awards celebrate the people, not products, of the cybersecurity industry. From the best ethical hackers and cybersecurity’s rising stars to the best sales leader and the coveted Godfather/Godmother of security, the categories recognised individuals and teams working hard to protect Britain from cybercrime and raise awareness of security issues. The...

Read More
 

Latest Threats

Attivo Networks showcases deception technology at GITEX

Attivo Networks, an award-winning leader in deception for cybersecurity threat detection, is joining Crestan International, a leading value added distributor, at GITEX Technology Week 2018 to highlight the critical role deception technology plays in an active defence strategy. At the event, the company is showcasing the Attivo Networks ThreatDefend Deception...

Read more

ESET researchers discover first UEFI rootkit detected in cyberattack

ESET researchers have discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers. Dubbed LoJax by ESET, this rootkit was part of a campaign run by the infamous Sednit group against several high-profile targets in central and Eastern Europe and is the first-ever publicly...

Read more

Industry experts comment on Facebook security breach

Industry experts have commented on a Facebook security breach which affected up to 50 million accounts. The social media giant wrote about the incident on its website, stating that attackers exploited a vulnerability in Facebook’s code that impacted ‘view as’ – a feature which enables people to see what their...

Read more

Latest Whitepapers

 

Events

  • Sun
    14
    Oct
    2018
    Thu
    18
    Oct
    2018

    GITEX

    Dubai World Trade Centre
  • Mon
    22
    Oct
    2018
    Tue
    23
    Oct
    2018

    Gartner Security and Risk Management Summit 2018

    Dubai, UAE
 
 
kuwait

Get to know

 

Deep Dive

9th October 2018

Kaspersky Lab expert on de-risking Digital Transformation

Every business and organisation, whether small or large, is likely going through a Digital Transformation process. But this move to digitilisation does not come risk-free. Ilijana Vavan, Managing Director for...

8th October 2018

Securing credit card transactional data is crucial, says Xperien expert

Ever wondered where every credit card transaction is recorded and stored and how secure that data is, especially after the hardware on which that data is stored reaches end-of-life? If...

12th September 2018

Industry experts on how best to secure the endpoint

Endpoint security is a key consideration for all CISOs and security professionals facing the reality that cyberattacks are now considered inevitable. Industry experts discuss how they think CISOs should best...

8th August 2018

Protecting your data – fighting fire with fire with zero-day recovery

For any given organisation, data is the fuel that keeps your business going, without which you cannot operate. Protecting this data should therefore be the priority of any business. However,...

23rd July 2018

Prioritising investment: Best practice for CISOs on a budget

CISOs face the constant challenge of working to a budget against the backdrop of an ever-growing cyberthreat landscape. It can be difficult to know where to prioritise investment. Intelligent CISO...

16th July 2018

Cybersecurity is new source of ‘competitive advantage’ for retailers

Cybersecurity is a new source of competitive advantage for retailers. That’s according to a report by Capgemini's Digital Transformation Institute, which has called for more organisations to align cybersecurity policies with...

29th June 2018

Digital forensics – the tools you need to investigate a cyberbreach

Every organisation and enterprise around the world is now facing the very real possibility that they may become the victim of a data breach. Intelligent CISO hears from a number...

Browse our latest issue

Magazine Cover

View Magazine Archive