Find

October 20, 2020

Tenable announces new capabilities to its Lumin platform

The latest enhancements to the Cyber Exposure Management Platform enable organizations to predict which vulnerabilities pose the greatest business risk and act with confidence to effectively reduce risk across their modern, distributed environments.
by | 2 min read
October 7, 2020

Tenable announces new capabilities to secure cloud compute instances

Frictionless Assessment leverages native technologies deployed as part of the cloud asset to continuously assess instances for vulnerabilities. Customers will be able to evaluate cloud assets without interruption.
by | 2 min read
September 7, 2020

Cloud Box Technologies unveils new security practice to develop its portfolio

The portfolio of cyber security services from CBT now includes system protection, network and data protection, cloud security, identity and access governance, and managed and professional security services.
by | 2 min read
July 28, 2020

Five practices CISOs can follow to tackle security challenges

For the CISO, the first task is to identify what is only innocent smoke from what is actually a fire. By combining tools like threat intelligence, vulnerability research, and probability risk, CISOs can begin to prioritize.
by | 3 min read
July 8, 2020

Qualys Appoints Ben Carr as Chief Information Security Officer

Ben is a proven information security and risk executive and thought leader with more than 25 years of experience in executing long-term security strategies.
by | 2 min read
September 20, 2022

Understanding and Preventing the Log4j Exploit and Botnets

Of all the security issues that have appeared over the last few years, none has had the impact of the Log4j exploit. Also called the Log4Shell, it was reported to the developers, the Apache Software Foundation, on 24 November, 2021, by the Chinese tech giant Alibaba and it took two weeks to develop and release a fix. The existence of the Log4j exploit was first publicly published in a tweet by Chen Zhaojun, a cyber security researcher with the Alibaba Cloud Security team on December 9, 2021
by News Desk | 5 min read
January 22, 2022

AlJammaz Technologies signs distribution agreement with Acronis

“with our vast experience in managing cybersecurity business and our expertise across cloud computing, at AlJammaz Cloud. Our teams will thoroughly assist Acronis to recruit the right mix of new partners,”says Mr Adel Qahwash.
by News Desk | 2 min read
January 5, 2022

5 Key principles for securing smart networks

In today’s world—where we increasingly rely on an aggregation of interconnected environments that blur the lines between our professional and personal lives—networks and security must work together as a single system at every layer.
by News Desk | 5 min read
September 26, 2021

Saudi organizations cite vulnerability in technology put in place during the pandemic

For many Saudi organizations, pandemic has boosted remote work. In fact, 91 percent of businesses currently use remote workers, up from only 34% in early 2020, majority intends to keep remote working for the future.
by | 2 min read