Magazine Button

Top Stories

HID global expert on the rising role of IT in physical access control

Shifting budgets and responsibilities require IT and physical security teams to consider fundamental change in day-to-day operations, says Luc Merredew, […]

Using the MITRE ATT&CK framework for threat hunting success

Threat hunting is a critical discipline. But how do you do it methodically and consistently to drive success? Here, Tim […]

‘Is IoT widening the IT security gap?’ – Aruba expert

Rabih Itani, Regional Business Development Manager, Security, Middle East and Turkey at Aruba, a Hewlett Packard Enterprise company, discusses how […]

Interview: LogMeIn expert on strengthening password security

Despite weak, stolen or reused passwords being the main cause of breaches, IT executives still lack control over password security […]

Kaspersky Lab highlights 2018 regional and global threat landscape

There has been an unprecedented number of cyberattacks and the malware count has reached an all-time in high in 2018, […]

Cyxtera integrates zero-trust security into global data centre footprint

Cyxtera Technologies, the secure infrastructure company, has announced the integration of AppGate SDP, its software-defined perimeter solution, across its 50+ […]

Tenable releases study on measuring and managing cyber-risks

Tenable, the cyberexposure company, has released the Measuring and Managing the Cyber Risks to Business Operations Report, an independent study […]

Oculeus launches new real-time telecoms fraud protection service

Oculeus, a leading provider of innovative telecommunications solutions, has announced the launch of Oculeus-Protect, a new real-time telecoms fraud protection […]

Bromium warns of malicious email attachments in run up to Christmas

Bromium, a pioneer and leader in application isolation and containment for endpoint protection that stops advanced malware attacks, has warned […]

Trend Micro VP on the security challenges facing the multi-cloud

The current debate on the table is the adoption of a multi- or dispersed-cloud approach and what this means to […]

Browse our latest issue

Magazine Cover

View Magazine Archive