Written by Hadi Jaafarawi, managing director – Middle East, Qualys The cybersecurity threat landscape has never been more challenging, sophisticated, and severe. Research suggests that in...
Written by Ram Narayanan, Country Manager at Check Point Software Technologies, Middle East Supply chain attacks aren’t new. If the past couple of years has taught...
Written by Sherrod DeGrippo, Vice President for Threat Research and Detection at Proofpoint As cryptocurrency and non-fungible tokens (NFTs) become more mainstream, and capture headlines for...
Written by Barbara Maigret, Global Head of Sustainability and CSR at Fortinet Our society faces significant challenges that must be addressed quickly to prevent disruptions that...
Written by Zeki Turedi, CTO – EMEA, CrowdStrike Big data and data science are common words in cybersecurity. Big data is a collection of large and...
Written by Yossi Naar, Chief Visionary Officer, and Cofounder, Cybereason Extended Detection and Response (XDR) is everywhere today, and it seems that every company is rolling...
Written by Sundaram Lakshmanan, CTO of SASE products at Lookout There’s a great scene in the 1997 film “Contact” where the protagonist Dr. Eleanor Arroway, played...
With an ever growing number of smartphone users, the development of mobile applications has become a booming industry. Today there are millions of apps, helping users...
Written by Lukas Stefanko, Malware Researcher at ESET These days, the device in your pocket can do far more than call or send text messages. Your...
Sander Vinberg, the Senior Threat Evangelist at F5 Labs, highlights the tactics organisations need to stay safe Every year, F5 Labs publishes the Application Protection Report. Our...