Find

September 20, 2022

Understanding and Preventing the Log4j Exploit and Botnets

Of all the security issues that have appeared over the last few years, none has had the impact of the Log4j exploit. Also called the Log4Shell, it was reported to the developers, the Apache Software Foundation, on 24 November, 2021, by the Chinese tech giant Alibaba and it took two weeks to develop and release a fix. The existence of the Log4j exploit was first publicly published in a tweet by Chen Zhaojun, a cyber security researcher with the Alibaba Cloud Security team on December 9, 2021
by News Desk | 5 min read
September 19, 2022

Axis Communications set to highlight security solutions at the ISNR 2022

Axis Communications will exhibit at the International Exhibition of National Security and Resilience (ISNR) in Abu Dhabi from October 10 to 12. The global security and surveillance industry leader will showcase end-to-end surveillance solutions, ranging from safe city technology aimed at government and law enforcement to the latest in Cybersecurity and video analytics.
by News Desk | 2 min read
September 19, 2022

‘Living Security’ XDR architecture to be showcased at GITEX 2022 by Trellix

Trellix, a cybersecurity company at the forefront of extended detection and response (XDR), announced that it will make its GITEX debut at the 2022 edition of the show, which will take place from October 10-14 in Dubai, UAE. The company will demonstrate how Trellix XDR, with its unique ability to learn and adapt while remaining open and native
by News Desk | 2 min read
September 16, 2022

81% of IT leaders think 20/20 visibility improves network security

Infoblox Inc., announced the findings of a Forrester Consulting study, which discovered that IT leaders worldwide have a universal desire for greater network visibility. The findings highlight a convergence in security and networking, which IT decision makers now see as the missing strategy for improving security response, automating compliance tasks, and better managing processes and outcomes.
by News Desk | 2 min read
September 15, 2022

Moro Hub, Trend Micro collaborate to bolster cybersecurity skills in UAE

Trend Micro Incorporated, a global provider of cybersecurity solutions, in partnership with Moro Hub, subsidiary of Digital DEWA, the digital arm of Dubai Electricity and Water Authority (PJSC) hosted a threat hunt workshop at the Sofitel Dubai Jumeirah Beach, Dubai, UAE, aimed at fortifying the nation’s digital infrastructure and raise awareness of cybersecurity. With 25 participants, the competition consisted of two separate phases: Phase 1: Attack and Phase 2: Defend.
by News Desk | 2 min read
September 14, 2022

Check Point Software launches prevention focused suite of security solutions

Check Point® Software Technologies Ltd., a global provider of cyber security solutions, has launched Check Point Horizon, a prevention-focused suite of security operations solutions and services that combines proactive management solutions for Managed Prevention and Response (MDR/MPR), Extended Prevention and Response (XDR/XPR), and Events.
by News Desk | 3 min read
September 14, 2022

How IoT fuels Business Model Innovation

In this article we will go over 3 stories of companies who leveraged the power of IoT to create a new service, a new bundled product and sometimes an entirely new business line!
by News Desk | 5 min read
September 13, 2022

One potential intrusion identified every seven minutes: report

CrowdStrike, a provider of cloud-delivered endpoint, cloud workload, identity, and data protection, has released the fourth annual CrowdStrike Falcon OverWatch threat hunting report, titled Nowhere to Hide: 2022 Falcon OverWatch Threat Hunting Report. The global report reveals a 50% increase in hands-on intrusion attempts year over year (YoY), as well as distinct changes in attack trends and adversary tradecraft.
by News Desk | 2 min read
September 8, 2022

Network convergence requires state-of-the-art security

In recent years, rapid advances in technology coupled with expanding guest expectations have led to an increase in the number of hotels moving toward converged networks. These networks, which integrate data, video and voice into a single system, have many advantages, including increased visibility, enhanced performance, reduced costs and easier management.
by News Desk | 3 min read
September 7, 2022

94% of women in the Middle East interested in pursuing a cybersecurity degree

Women make up only 25% of the global cybersecurity workforce today. This comes at a time when 57% of organizations report unfilled industry positions. According to the report, 70% of those polled stated that a role model encouraging them to enter the field and learn more about the industry was a key driver in their decision to pursue a degree in cybersecurity.
by News Desk | 3 min read