Written by Firas Jadallah, Regional Director, Middle East, and Africa at Genetec The retail industry has evolved dramatically over a relatively short period. Today, digital transformation...
Written by Hussam Sidani, the Regional Vice President for the Middle East and Turkey at Cybereason How secure is your organization if you can only stop...
Written by Phil Muncaster, the guest writer at ESET IT security is often regarded as the “Department of No” and sometimes it’s easy to see why....
Written by Bart Lenaerts-Bergmans, Sr. Product Marketing Manager, Threat Intelligence, CrowdStrike Financially motivated criminal activities, aka “eCrime,” happen in waves. They come and go as adversaries...
Next time you’re tempted to hold off on installing software updates, remember why these updates are necessary in the first place says Phil Muncaster, guest writer...
Josh Goldfarb, Fraud Solutions Architect for EMEA and APCJ at F5, on why you can’t afford to ignore a well-known and growing menace If a burglar...
Written by Tertius Wolfaardt, Architecture and Engineering Manager at Axis Communications Most students in the UAE started a new school year at the end of August,...
As organizations continue to embrace digital transformation, the phenomenon of convergence is taking place in several different ways. For example, more and more use cases are...
Check Point Research (CPR) outlines a new model of hacktivism now trending worldwide. Five characteristics mark today’s form of hacktivism, according to researchers: political ideology, leadership...
In this day and age, you’d be hard-pressed to find someone who can confidently say their data is completely secure. The sad truth is, very little...