Category: Features

Securing the cloud

Cloud adoption in the region is presently at a nascent stage, but steadily on the rise. Organizations in the

Read More...

Ransomware-proof

The Middle East and Africa did remain relatively unscathed in the recent ransomware attacks, with only a few isolated

Read More...

Endpoint critical to security

The endpoint security market is expected to witness substantial growth, especially due to rising security risks across several applications

Read More...

Petya: The story so far

Ransomware initially targeted individuals through phishing or other infection techniques that required user interaction. While profitable to the cybercriminals,

Read More...

GISEC: What to expect?

GISEC is one of the premier security-focused events in the region and this year’s event could not have been

Read More...

Beyond BYOD

Remote access networking has been gaining a lot of popularity as more and more enterprises are adopting this technology

Read More...

Is ‘cyber’ different here?

A large number of cyber-incidences claimed spotlight last year. Attacks varied from high-profile DDoS using hijacked internet-facing security cameras

Read More...

Navigating the cyber threat landscape

Cyber-crime is not a new phenomenon and it has gained momentum in recent years leading to more cyber-attacks on

Read More...

Mobile Sliding Menu