Interviews
Video: Axis Inaugurates Experience Center in Dubai

Axis Communications has opened an Axis Experience Center (AEC) in Dubai. As the first experience center in the Middle East & Africa (MEA) region, the center has been designed to offer visitors an intimate look at the wide range of network and security solutions offered by the world’s leading surveillance services provider. We speak with Rudie Opperman to learn more:
To know more about the Axis Experience Center, log on to www.axis.com/axis-experience-center/
If you liked the video, please like, share, and comment below.
Follow us on social media:
✓ Linkedin – https://www.linkedin.com/company/74044193
✓ Twitter – https://twitter.com/secreviewmag
✓ Facebook – https://www.facebook.com/secreviewmag
✓ Website – https://securityreviewmag.com/
For more videos, please subscribe to our channel. Also, hit the bell icon to join our Notification Squad!
Cyber Security
Surge in Ransomware Attacks Has Made Effective Cyber Security and Defence a Top Priority

Emad Fahmy, the Systems Engineering Manager for Middle East at NETSCOUT, speaks about the evolving threat landscape in the region
How has the security threat landscape evolved in recent months?
According to a 2021 survey by PwC, cybersecurity is a growing concern for organizations, with approximately 43% of Middle East CEOs planning to increase investments in cybersecurity and data privacy by 10% or more over the next three years. Moreover, 41% of these leaders think that their organization should be doing more to measure cybersecurity. The ever-evolving threat environment has made it increasingly necessary to be vigilant.
Cybercrimes continue to grow in terms of both complexity and frequency. Among the businesses that identify breaches or attacks, 21% lose money, data, or other assets, and 35% report being negatively impacted in other ways and suffering from wider business disruption. As such, it’s vital for enterprises to ensure the security of data, applications, networks, and critical business processes to stay competitive and thwart attackers. Depending on traditional security solutions and methodologies isn’t enough to combat the sophisticated attacks that target businesses today.
Is ransomware still an issue?
It is, unfortunately. The unprecedented surge in ransomware attacks has made effective cyber security and defence a top priority in today’s world. Every day, new ransomware attacks are reported by businesses and government authorities alike, not to mention the attacks that go unreported, and it seems like no one is immune.
Threat intelligence is vital to combat ransomware attacks. Threat intelligence is the study of the bad actors who perpetrate these attacks, along with the tactics and tools they use. This involves unveiling the bad actor’s attack methodologies and why they are targeting those victims. This knowledge is then turned into actionable insight that enterprises can access and comprehend. Empowered with this knowledge, enterprises can learn about their network’s vulnerabilities to actively defend against ransomware.
Companies have been trying to protect the endpoint for years. How can companies make sure endpoints are protected and monitored for attacks and mitigation?
As service providers increasingly focus on cloud services, edge computing, end-users, and endpoint devices, the traditional approach of utilizing distributed detection solutions in concert with centralized mitigation centres within the network is no longer enough. However, mitigation measures that are distributed out to the network edge necessitate both infrastructure and intelligent defence capabilities that are capable of working hand in hand across locations and platforms.
A more modern threat mitigation strategy involves distributing both detection and mitigation functions throughout the network to intercept threats nearer to the source. In this way, network operators can stop attacks upstream, instead of having to incur the cost of peering and transit link traffic that is only going to be discarded once it reaches a centralized scrubbing centre. By conducting the scrubbing as close as possible to the threat source, service providers can reduce any potential impact on traffic, helping to ensure high-quality service.
Interviews
Podcast: Bringing Innovation in Access Control and Workforce Management

In this episode of Future Tech Podcast Show, we are joined by Shiraz Kapadia, CEO, and President at Invixium, who speaks about the company, the products and solutions it offers on the market, and its regional plans:
We are also available on Anchor.fm, Spotify, Apple Podcasts, Google Podcasts, RadioPublic, PocketCasts, and OverCast.
GISEC
Proactively Protecting Companies From Threats

Tamer Odeh, the Regional Sales Director at SentinelOne, speak about their company’s participation in GISEC 2022.
If you liked the video, please like, share, and comment below.
Follow us on social media:
✓ Linkedin – https://www.linkedin.com/company/74044193/
✓ Twitter – https://twitter.com/secreviewmag/
✓ Facebook – https://www.facebook.com/secreviewmag
✓ Website – https://securityreviewmag.com/
For more videos, please subscribe to our channel. Also, hit the bell icon to join our Notification Squad!
-
Cyber Security1 week ago
Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime
-
Cyber Security7 days ago
The Conti Enterprise: Ransomware Gang that Published Data Belonging to 850 Companies
-
Cyber Security4 days ago
Surge in Ransomware Attacks Has Made Effective Cyber Security and Defence a Top Priority
-
Cyber Security1 week ago
Proofpoint Report Reveals Threat Actors’ Top Social Engineering Tactics and Campaigns
-
Cyber Security1 week ago
Forescout Discloses OT:ICEFALL 56 Vulnerabilities Found in Thousands of Devices
-
Cyber Security1 week ago
Nozomi Networks Extends its Threat Intelligence Service to Third-Party Security Platforms
-
Cyber Security1 week ago
Trend Micro Forecasts Major Risks for Organisations in 2022 Through its Latest Cyber Risk Index
-
Cyber Security1 week ago
How Cybersecurity Readiness Prevents SMBs from Fuelling Supply Chain Attacks