Connect with us

Interviews

Video: Simplifying End-to-End Authentication

Published

on

In this interview, Steven Hope, the CEO of Authlogics, speaks about how two-way identification can prevent identity theft and financial fraud, challenges faced by CXOs, and so on:

https://www.youtube.com/watch?v=hSGQj5_aXII

If you liked the video, please like, share, and comment below.

Follow us on social media:
✓ Linkedin – https://www.linkedin.com/company/74044193/
✓ Twitter – https://twitter.com/secreviewmag
✓ Facebook – https://facebook.com/secreviewmag
✓ Website https://securityreviewmag.com/

More information: https://authlogics.com/

For more videos, please subscribe to our channel. Also, hit the bell icon to join our Notification Squad!

Cyber Security

Surge in Ransomware Attacks Has Made Effective Cyber Security and Defence a Top Priority

Published

on

Emad Fahmy, the Systems Engineering Manager for Middle East at NETSCOUT, speaks about the evolving threat landscape in the region

How has the security threat landscape evolved in recent months?
According to a 2021 survey by PwC, cybersecurity is a growing concern for organizations, with approximately 43% of Middle East CEOs planning to increase investments in cybersecurity and data privacy by 10% or more over the next three years. Moreover, 41% of these leaders think that their organization should be doing more to measure cybersecurity. The ever-evolving threat environment has made it increasingly necessary to be vigilant.

Cybercrimes continue to grow in terms of both complexity and frequency. Among the businesses that identify breaches or attacks, 21% lose money, data, or other assets, and 35% report being negatively impacted in other ways and suffering from wider business disruption. As such, it’s vital for enterprises to ensure the security of data, applications, networks, and critical business processes to stay competitive and thwart attackers. Depending on traditional security solutions and methodologies isn’t enough to combat the sophisticated attacks that target businesses today.

Is ransomware still an issue?
It is, unfortunately. The unprecedented surge in ransomware attacks has made effective cyber security and defence a top priority in today’s world. Every day, new ransomware attacks are reported by businesses and government authorities alike, not to mention the attacks that go unreported, and it seems like no one is immune.

Threat intelligence is vital to combat ransomware attacks. Threat intelligence is the study of the bad actors who perpetrate these attacks, along with the tactics and tools they use. This involves unveiling the bad actor’s attack methodologies and why they are targeting those victims. This knowledge is then turned into actionable insight that enterprises can access and comprehend. Empowered with this knowledge, enterprises can learn about their network’s vulnerabilities to actively defend against ransomware.

Companies have been trying to protect the endpoint for years. How can companies make sure endpoints are protected and monitored for attacks and mitigation?
As service providers increasingly focus on cloud services, edge computing, end-users, and endpoint devices, the traditional approach of utilizing distributed detection solutions in concert with centralized mitigation centres within the network is no longer enough. However, mitigation measures that are distributed out to the network edge necessitate both infrastructure and intelligent defence capabilities that are capable of working hand in hand across locations and platforms.

A more modern threat mitigation strategy involves distributing both detection and mitigation functions throughout the network to intercept threats nearer to the source. In this way, network operators can stop attacks upstream, instead of having to incur the cost of peering and transit link traffic that is only going to be discarded once it reaches a centralized scrubbing centre. By conducting the scrubbing as close as possible to the threat source, service providers can reduce any potential impact on traffic, helping to ensure high-quality service.

Continue Reading

Interviews

Video: Axis Inaugurates Experience Center in Dubai

Published

on

Axis Communications has opened an Axis Experience Center (AEC) in Dubai. As the first experience center in the Middle East & Africa (MEA) region, the center has been designed to offer visitors an intimate look at the wide range of network and security solutions offered by the world’s leading surveillance services provider. We speak with Rudie Opperman to learn more:

To know more about the Axis Experience Center, log on to www.axis.com/axis-experience-center/

If you liked the video, please like, share, and comment below.

Follow us on social media:
✓ Linkedin – https://www.linkedin.com/company/74044193
✓ Twitter – https://twitter.com/secreviewmag
✓ Facebook – https://www.facebook.com/secreviewmag
✓ Website – https://securityreviewmag.com/

For more videos, please subscribe to our channel. Also, hit the bell icon to join our Notification Squad!

Continue Reading

Interviews

Podcast: Bringing Innovation in Access Control and Workforce Management

Published

on

In this episode of Future Tech Podcast Show, we are joined by Shiraz Kapadia, CEO, and President at Invixium, who speaks about the company, the products and solutions it offers on the market, and its regional plans:

We are also available on Anchor.fm, Spotify, Apple Podcasts, Google Podcasts, RadioPublic, PocketCasts, and OverCast.

Continue Reading
Advertisement


Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.