Magazine Button

Analysis

Networks Unlimited expert Anton Jacobsz on how to protect your data

It is pretty much given that most people have their personal information documented somewhere in virtual space. Anton Jacobsz, Managing Director at value-added distributor Networks Unlimited, says it is essential that businesses and individuals know all the risks and how to prevent them. Data has been captured in many forms and bits and bytes through […]


Opinion: How an IoT hack could be a line from a modern-day cartoon

Bryan Hamman, Arbor Networks’ territory manager for Sub-Saharan Africa, says hackers go after data because it’s valuable and can be used for gain. For movie buffs and television fans, some lines are enduring classics. For example, how many times have you heard the phrase: “Step away from the vehicle?” in one form or another? From […]


FireEye Cyber Defense Live spotlights security strategies

FireEye, Inc., the intelligence-led security company, has held its Cyber Defense Live event in Dubai, with the endorsement of the UAE Telecommunications Regulatory Authority (TRA). FireEye Cyber Defense Live in Dubai brought together global and regional FireEye executives as well as experts from the TRA, Etisalat Digital, other specialist companies, and customers to discuss best […]


Practical advice for securing IoT devices and protecting your network

The first high-profile DDoS attack using IoT devices that got the attention of the mainstream media happened around Christmas 2013 and was used to interrupt the launch of a prominent game. This attack came from the LizardStresser botnet, consisting primarily of webcams and CPE routers. In November 2016, the source code for the Mirai botnet […]


Digital Shadows’ CEO & Co-Founder: ‘When imitation is not the sincerest form of flattery’

The huge cost of cybercrime was once again graphically illustrated a few weeks ago by a story on the BBC of a hacker who allegedly used phishing techniques and fake websites to steal over $100m from two major US companies. According to the US Department of Justice, the Lithuanian man allegedly set up a bogus […]


Intel Security : New Global Cybersecurity Report

Intel Security, in partnership with the Centre for Strategic and International Studies (CSIS), has released “Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity,” a global report and survey revealing three categories of misaligned incentives: corporate structures versus the free flow of criminal enterprises; strategy versus implementation; and senior executives versus those in implementation […]


Attacker innovation and IoT exploitation fuel DDoS attacks

Arbor Networks, the security division of NETSCOUT, has released its 12th Annual Worldwide Infrastructure Security Report (WISR). The report covers a range of issues from threat detection and incident response to managed services, staffing and budgets. Its focus is on the operational challenges Internet operators face daily from network-based threats and the strategies adopted to address and […]


Multi-layered security: Defending from all sides

The threat landscape in the Middle East is ever evolving and always advancing with tailor-made, stealthy threats that evade traditional, point-in-time security defences. Instead of relying on a single attack vector, an advanced attack will use whatever unprotected paths exist, often combining paths in a blended method, to reach its target and accomplish its mission, […]


Browse our latest issue

Magazine Cover

View Magazine Archive