June 13, 2022
Protecting apps and APIs with F5
Application service environments have become more complex as organizations improve the digital services they provide to users and pursue a broader range of infrastructure models to improve performance and reduce costs.
June 10, 2022
HONOR joins hands with filmmaking industry leaders
HONOR, the global technology brand, recently announced a collaboration with Nayla Al Khaja and Raindance Film School for a masterclass demonstrating how to create a short film on the HONOR Magic4 Pro.
June 8, 2022
Going passwordless in today’s business venture – How secure is it?
A recent Information Age article further claims that the time is right for passwordless authentication, as “passwordless authentication makes users’ lives easier” and removes the human factor from cybersecurity — where “people just can’t be trusted to set reliable passwords, to change them frequently, to make sure they are strong, and to keep them secure.”
May 20, 2022
ADDED aligns with SAP to nurture UAE talent
According to the MOU, ADDED intends to leverage SAP's UAE cloud offering while also enabling SAP to accelerate its regional expansion as an authorized cloud services provider.
May 17, 2022
Trellix accelerates growth in first 100 days
Ashley Arbuckle has joined Trellix as senior vice president of customer success, with the goal of creating and accelerating excellent client experiences in order to achieve the best security outcomes.
April 29, 2022
Emirates Mars Mission discovers new mysterious martian aurora
These three types of aurora had previously been identified, but clear global images of the discrete aurora were elusive until new observations were made by EMM’s probe shortly after its arrival on Mars. Now, an increased focus on discrete aurora observations by the EMM science team has resulted in observations of this new phenomenon of sinuous discrete aurora.
April 27, 2022
Cybersecurity mitigations no organisation can afford to ignore
Code signing is another underused approach, in light of architectural trends that pull code from disparate sources at runtime. In particular, sub-resource integrity (SRI) headers can ensure that external scripts haven’t been modified when they are called at runtime. As applications increasingly rely on external scripts to pull in new features, SRI is a powerful tool to shut down vectors.