Find

February 25, 2021

Sophos to provide Intercept X endpoint protection for 5G PCs

Sophos Intercept X is designed to protect advanced computing systems and endpoints, stopping the latest cybersecurity threats with deep learning AI and anti-ransomware capabilities.
by | 2 min read
February 7, 2021

Will the Clubhouse model work in China?

On Friday just past midnight, I stumbled across a Clubhouse […]
by | 6 min read
February 3, 2021

Dubai’s IBC Group to partner with Artifi to empower women artists globally

The initiative seeks to empower the creative endeavours of women artists around the world, by allowing them to access the financial value of their creations.
by | 2 min read
January 24, 2021

Sophos detects source Of “MrbMiner” attacks pointing database servers

Database servers are an attractive target for cryptojackers because they are used for resource intensive activity and therefore have powerful processing capability.
by | 2 min read
January 6, 2021

Beware of these 7 ways in which malware can infest your device

To help you combat these threats, we look at some of the most common methods and tactics used to tricking netizens into downloading malware and compromising their data and security.
by | 4 min read
December 30, 2020

Risks in IoT Supply Chain by Palo Alto Networks

A supply chain is the series of links between a vendor, manufacturer or retailer and their providers, which make it possible to manufacture and provide hardware or software products or operational services to consumers.
by | 7 min read
December 16, 2020

TII appoints global experts to the Board of Advisors at CRC

CRC is one of the few global centres bringing together theoretical and applied cryptographers in a research-oriented setting. The cryptographers collaborate on breakthrough research projects that lead to innovative outcomes in cryptography.
by | 2 min read
December 14, 2020

Digital exposure – Vulnerability – Cybersecurity

It’s imperative that companies make cybersecurity awareness, prevention and security practices a part of their culture. As per the studies conducted in the year 2016, 95% of breached records came from only three industries; government, retail, and technology.
by | 7 min read
December 13, 2020

Key findings from Entrust 2020 Middle East Encryption Trends Study

Protecting consumer personal information is the top driver for deploying encryption in the Middle East region (67% of respondents), 13% higher than the global average.
by | 3 min read
December 6, 2020

Human Capital: Google’s labor stumbles

Welcome back to Human Capital, a weekly newsletter that looks […]
by | 4 min read