Magazine Button
 
 

SIRP and Z Services partner to offer SOAR solution for MENA enterprises

SIRP has announced a major partnership with Z Services, a leading cybersecurity SaaS provider in the MENA region, to deliver Security Orchestration, Automation and Response (SOAR) solution across the Middle East and North Africa (MENA). SIRP offers a unique SOAR platform that combines security operations management with valuable cybersecurity intelligence. Z Services is the first company in the MENA region to offer an in-country, multi-tenant cloud security architecture that include...

Read More

SIRP and Z Services partner to offer SOAR solution for MENA enterprises

SIRP has announced a major partnership with Z Services, a leading cybersecurity SaaS provider in the MENA region, to deliver Security Orchestration, Automation and Response (SOAR) solution across the Middle East and North Africa (MENA). SIRP offers a unique SOAR platform that combines security operations management with valuable cybersecurity intelligence. Z Services is the first company in the MENA region to offer an in-country, multi-tenant cloud security architecture that include...

Read More

SEGA Europe outmanoeuvres cyberthreats with Palo Alto Networks

Palo Alto Networks, a global cybersecurity leader, has announced that SEGA Europe, the distribution arm of interactive game publisher SEGA Games Co., Limited, chose the Palo Alto Networks Security Operating Platform as the standard for its security operations, providing centralised cybersecurity detection and prevention for its London headquarters and five world-class development studios spanning the UK, France, Bulgaria and Canada. SEGA is a legendary video game pioneer and a prolific...

Read More
 

Latest Threats

SophosLabs Uncut releases detailed malware analysis of new ransomware called MegaCortex

According to Sophos, a global leader in endpoint and network security, MegaCortex was a relatively little-seen malware that suddenly spiked in volume on May 1. Sophos has seen MegaCortex detections in the US, Canada, Argentina, Italy, the Netherlands, France, Ireland, Hong Kong, Indonesia and Australia. The ransomware has manual components similar to...

Read more

Kaspersky Lab reveals analysis of MuddyWater cyberespionage group

Kaspersky Lab has revealed how the cyberweapons used by Middle Eastern cyberespionage group, MuddyWater, reveal multiple ‘false flag’ attempts to point the finger of attribution at Chinese, Russian, Turkish and KSA threat actors and confuse security researchers and the authorities. MuddyWater is an advanced threat actor that first surfaced in...

Read more

ManageEngine adds user and entity behaviour analytics to SIEM solution

ManageEngine, the real-time IT management company, has announced that it has introduced user and entity behavior analytics (UEBA) into its SIEM solution, Log360. With score-based risk assessment, threat corroboration, anomaly detection powered by Machine Learning, and other new capabilities, the Log360 UEBA add-on helps security professionals identify, qualify, and investigate internal threats and...

Read more

Latest Whitepapers

 

Events

  • Tue
    04
    Jun
    2019
    Thu
    06
    Jun
    2019

    Infosecurity Europe 2019

    Olympia, London
  • Sun
    06
    Oct
    2019
    Thu
    10
    Oct
    2019

    GITEX Technology Week

    Dubai World Trade Centre
 
 

Get to know

 

Deep Dive

7th February 2019

Industry experts discuss how best to secure a remote workforce

The modern workforce is more flexible and dynamic than ever before, with technology enabling employees to work from anywhere, at any time, on any device. But these new remote workforces...

17th January 2019

Get to Know Your Customer Day – seven business-critical outcomes

Observed annually on the third Thursday of every quarter, ‘Get to Know Your Customer Day’ reminds businesses, large and small, to take the time to better understand their customers –...

17th January 2019

Using ROSI to evaluate cybersecurity technologies

Being able to demonstrate ROI on security investments to the board is one of the tasks every CISO encounters. And it is not without its challenges. Intelligent CISO spoke to...

15th January 2019

Quest Software expert on the insider threat to the education sector

Cybercrime is a growing problem globally and the higher education sector is not immune to this threat, argues Colin Truran, Principal Technology Strategist, Quest Software. As today’s modern campus relies...

17th December 2018

Using the MITRE ATT&CK framework for threat hunting success

Threat hunting is a critical discipline. But how do you do it methodically and consistently to drive success? Here, Tim Bandos, VP of Cyber Security, Digital Guardian, introduces threat hunting...

10th December 2018

CyberArk expert – ‘Protecting CNI starts with securing social media’

Hacks to our CNI the facilities, information, networks and processes the country requires to function on a daily basis – or human error in relation to critical systems have become a...

6th December 2018

Expert view: The inevitable convergence of physical and cybersecurity

It may not be immediately clear as to how, but physical and cybersecurity are converging and the need for a combination of cyber and physical defences will soon, if they...

Browse our latest issue

Magazine Cover

View Magazine Archive