Sander Vinberg, the Senior Threat Evangelist at F5 Labs, highlights the tactics organisations need to stay safe Every year, F5 Labs publishes the Application Protection Report. Our...
Written by David Brown, Security Operations Director from Axon Technologies The security strategy of an enterprise is a blend of traditional best practices and those that...
Written by Emad Fahmy, Systems Engineering Manager – Middle East, NETSCOUT Since mid-February, the NETSCOUT Arbor Security Engineering and Response Team (ASERT) has been monitoring the...
Written by Kinda Baydoun, Manager of Channels & Distribution – Middle East, Veeam Software There is a clear wave of optimism as I interact with our...
Written by Steven Hope, CEO, Authlogics Have you ever shared your Netflix password? If so, you are not alone. But have you stopped to think about...
Written by Zeki Turedi, CTO of EMEA at CrowdStrike After several years in which commercially motivated cybercrime has ranked highest in eCrime league tables, the last...
Written by Michael Byrnes, Director – Solutions Engineering, iMEA, BeyondTrust The GCC is humming with cloud activity, and understandably so. The cost-benefit analysis of cloud services...
Written by Allen McNaughton, Systems Engineering Director for Infoblox Public Sector It’s no secret that the cybersecurity industry is in something of a talent crisis. The...
Written by Claude Schuck, Regional Director, Middle East at Veeam Software Kubernetes is still in its early educational phase as a technology. On Gartner’s Hype Cycle,...
Written by André Lameiras, Security Writer at ESET Running and growing a business is hard work even in good times, but times of crisis bring a...