IT

MCAFEE STUDY REVEALS ONE-IN-FOUR ORGANIZATIONS USING PUBLIC CLOUD HAS HAD DATA STOLEN


New Survey Reports Poor Visibility is the Greatest Challenge to Cloud Adoption NEWS HIGHLIGHTS: Ninety-seven percent of organizations use cloud services (public, private, or a combination of both), up from 93 percent one year ago Eighty-three percent store sensitive data…read more

  0 Comments

CARBON BLACK TO SHOWCASE CB PREDICTIVE SECURITY CLOUD (PSC) AT GISEC


Carbon Black, a leader in next-generation endpoint security, today announced its participation at the Gulf Information Security Expo & Conference (GISEC 2018)for the fourth consecutive year, which will be held at the Dubai World Trade Centre from 1stto 3rdof May…read more

  0 Comments

7 PROVEN RESILIENCE BEST PRACTICES AGAINST RANSOMWARE FOR FINANCIAL SERVICES


By:  Gregg Petersen, Regional Vice President, Middle East & Africa at Veeam Software   After becoming one of the main cybersecurity threats in 2016 and causing global chaos in May 2017, ransomware is currently keeping everyone in a state of constant security…read more

  0 Comments

THE STRESS FACTOR: WHAT THE ONLINE RHETORIC DOESN’T TELL YOU ABOUT BUSINESS GROWTH


Author: Terri Hiskey, vice president, manufacturing product marketing, Epicor Software Corporation   You don’t have to search far on LinkedIn before you come across phrases like ‘I’m a results-driven go-getter’, ‘I thrive in…read more

  0 Comments

TIME TO RETHINK HOW WE MEASURE EFFECTIVENESS & EFFICIENCY OF SECURITY OPERATIONS


Roland Daccache, Senior Regional Sales Engineer MENA, Fidelis Cybersecurity   CISOs have become leaders in their businesses rather than just experts in their departments. They need to educate their peers on the scope, scale, severity and solutions for cybersecurity…read more

  0 Comments

THE THREE PILLARS OF CYBER SECURITY DEFENSE


Author: Morey Haber, vice president, technology, BeyondTrust The foundation of cyber security defense has been clouded by point solutions, false promises, and bolt on solutions that extend the value of a given technology, based on a need. After all, if we count how many…read more

  0 Comments

BEST PRACTICES FOR PRIVILEGED ACCESS MANAGEMENT


Privileged password management, sometimes called enterprise password management, refers to the practice and technique of securely controlling credentials for privileged accounts, services, systems, applications, and more. But unfortunately, with so much power inherent in…read more

  0 Comments

SERVICENOW LAUNCHES TRUSTED SECURITY CIRCLES


Now Security Analysts Are No Longer Alone in the War Against Cyber Threats   ServiceNow (NYSE: NOW) has announced Trusted Security Circles, a new cloud-based application that gives enterprises the ability to share and receive hyper-relevant threat intelligence in near…read more

  0 Comments

WHY DATA CLASSIFICATION SHOULD DRIVE YOUR SECURITY STRATEGY


Synopsis: If you haven’t identified what data is sensitive to your business, where it resides and how it’s being used, how can you hope to protect it? Thomas Fischer, Threat Researcher and Global Security Advocate at Digital Guardian, discusses why getting to…read more

  0 Comments

PURE STORAGE IN GARTNER MAGIC QUADRANT FOR FOURTH CONSECUTIVE YEAR


Again Positioned Furthest in Completeness of Vision   Pure Storage (NYSE: PSTG), the market’s leading independent all-flash data platform vendor for the cloud era, has announced that it has improved its position within the Leaders Quadrant of the Gartner’…read more

  0 Comments
 < 1 2 3 4 5 >  Last ›
SUBSCRIBE TO OUR NEWSLETTER