Find

August 8, 2021

Hybrid Workforce Needs Cybersecurity Rollout from Day One

Bad actors are taking advantage of the chaotic nature of these times, by launching coronavirus-themed cyber-attacks and impersonating well-known websites that try to provide useful, timely information for the general public. Indeed, COVID-19 has become the subject of choice for phishing and spear-phishing campaigns that seek to take advantage of the heightened level of fear and concern.
by | 3 min read
August 8, 2021

Check Point Research finds security vulnerabilities in Amazon Kindle

The vulnerabilities may have allowed a threat actor to gain complete control of a user's Kindle, perhaps resulting in the theft of the Amazon device token or other sensitive information stored on the device.
by | 2 min read
August 5, 2021

Cybercriminals narrow their focus on SMBs: Cyberthreat report by Acronis

The study, which was released at this week's Black Hat 2021 event, where Acronis is a Diamond sponsor, cautions that based on attack trends identified in the first six months of the year, small and medium-sized businesses (SMBs) are particularly vulnerable.
by | 3 min read
August 2, 2021

SonicWall: Record 304.7 million ransomware attacks within 6 months

In the fight against known and unknown threats, SonicWall’s patented Real-Time Deep Memory InspectionTM (RTDMI) identified record numbers of never-before-seen malware, posting a 54% year-to-date increase over the first half of 2020.
by | 4 min read
August 2, 2021

Hospitality organizations must accelerate digital transformation to secure long-term recovery

Research by Aruba, a HPE company, as of last year the hospitality sector was in a healthy – but not leading – place in its adoption of advanced technologies and moving computing to Edge. Over half of hospitality IT leaders had started to implement trials or applications in areas such as AI (55%), Internet of Things (IoT) (70%) and machine learning (57%).
by | 3 min read
August 1, 2021

Tenable’s Active Directory security readiness checks to disrupt attacks

Tenable®, Inc. developed 10 foundational configuration checks for its solutions, including Tenable.io, Tenable.sc and both Nessus Professional and Nessus Essentials, assess Microsoft Active Directory security readiness and align remediation efforts based on the threat landscape.
by | 2 min read
July 29, 2021

Interview with Fortinet’s Alain Penel

TECHx Executive Editor Rabab Zehra spoke with Alain Penel, Regional Vice President – Middle East, Fortinet, about the company's children's book, SD-WAN integration with Google Cloud Network Connectivity Center, remote working solutions, and channel partner initiatives. Let's dig a little deeper into the responses we got.
by | 3 min read
July 26, 2021

DDoS protection major concern for Middle East service providers

One of the big cyber security challenges brought about by the pandemic with the ‘work from home’ scenario is that it has caused rapid expansion of attack surface. Fifty-one percent of ME service providers have accelerated investment plans in security and this is a relatively low figure considering security, primarily DDoS security, should be a priority for every service provider.
by | 3 min read
July 22, 2021

Education at the edge of change: Connected without compromise

IT decision makers (ITDMs) in education are being tasked with providing increasingly complex network solutions to respected centres of learning. As they plan for a new term, they must ensure they have robust capabilities in place to respond to three main challenges: managing expanding campus footprints and devices; supporting more sophisticated and frequently hybrid teaching methods and safeguarding users and data against cybercrime.
by | 4 min read
July 15, 2021

Cybereason secures $275 million in crossover financing for its prominence in XDR

“Over the past year, we’ve experienced hyper growth across the globe as defenders recognize that ending advanced attacks isn’t possible using solutions that rely on meaningless alerts and human intervention,” said LiorDiv, CEO of Cybereason.
by | 3 min read