Magazine Button

Features

IBM mainframe ushers in new era of data protection

IBM (NYSE: IBM) today unveiled IBM Z, the next generation of the world’s most powerful transaction system, capable of running more than 12 billion encrypted transactions per day. The new system also introduces a breakthrough encryption engine that, for the first time, makes it possible to pervasively encrypt data associated with any application, cloud service […]


IBM expands global cloud data centre presence with four new facilities

IBM (NYSE: IBM) today announced that four new IBM Cloud data centres are now open, including two in London, England; one in San Jose, California; and one in Sydney, Australia. The four new facilities bring IBM’s global cloud data centre footprint to nearly 60 across 19 countries and bolster its existing cloud footprint in these […]


Equinix to show businesses how to adapt IT operations to the ‘Digital Edge’

Global Solution Architects to offer detailed, step-by-step guidance to businesses at 37th GITEX Technology Week on how to move their systems to ‘Digital Edge’ Equinix Inc, the global interconnection and data centre company, will show MENA enterprises how to address technology challenges and accelerate business performance, at GITEX. While ‘digital transformation’ seems to be the […]


FireEye Cyber Defense Live spotlights security strategies

FireEye, Inc., the intelligence-led security company, has held its Cyber Defense Live event in Dubai, with the endorsement of the UAE Telecommunications Regulatory Authority (TRA). FireEye Cyber Defense Live in Dubai brought together global and regional FireEye executives as well as experts from the TRA, Etisalat Digital, other specialist companies, and customers to discuss best […]


Practical advice for securing IoT devices and protecting your network

The first high-profile DDoS attack using IoT devices that got the attention of the mainstream media happened around Christmas 2013 and was used to interrupt the launch of a prominent game. This attack came from the LizardStresser botnet, consisting primarily of webcams and CPE routers. In November 2016, the source code for the Mirai botnet […]


Digital Shadows’ CEO & Co-Founder: ‘When imitation is not the sincerest form of flattery’

The huge cost of cybercrime was once again graphically illustrated a few weeks ago by a story on the BBC of a hacker who allegedly used phishing techniques and fake websites to steal over $100m from two major US companies. According to the US Department of Justice, the Lithuanian man allegedly set up a bogus […]


Intel Security : New Global Cybersecurity Report

Intel Security, in partnership with the Centre for Strategic and International Studies (CSIS), has released “Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity,” a global report and survey revealing three categories of misaligned incentives: corporate structures versus the free flow of criminal enterprises; strategy versus implementation; and senior executives versus those in implementation […]


Attacker innovation and IoT exploitation fuel DDoS attacks

Arbor Networks, the security division of NETSCOUT, has released its 12th Annual Worldwide Infrastructure Security Report (WISR). The report covers a range of issues from threat detection and incident response to managed services, staffing and budgets. Its focus is on the operational challenges Internet operators face daily from network-based threats and the strategies adopted to address and […]


Multi-layered security: Defending from all sides

The threat landscape in the Middle East is ever evolving and always advancing with tailor-made, stealthy threats that evade traditional, point-in-time security defences. Instead of relying on a single attack vector, an advanced attack will use whatever unprotected paths exist, often combining paths in a blended method, to reach its target and accomplish its mission, […]


Browse our latest issue

Magazine Cover

View Magazine Archive