Find

October 13, 2020

Acronis research reveals security gaps and the need for new solutions

The Acronis Cyber Readiness Report reveals that as hackers target remote workers, phishing, distributed denial of service (DDoS), and videoconferencing attacks are the most common tactics used.
by | 3 min read
October 11, 2020

Tenable signs strategic partnership with Center for Internet Security

This partnership is an important step in making foundational cybersecurity more attainable for both small and medium-sized organizations. To this end, CIS has developed a new prioritization scheme called the CIS Controls Assessment Specification for CIS Controls.
by | 2 min read
October 5, 2020

A10 Networks to join MENA Information Security Conference 2020 as sponsor

A10 Networks has a keynote speaking slot with the theme “The Evolution of Networks from Cyber Resistance to Resilience - in an Age of Smart Cities, Digital Economies & IoT”.
by | 2 min read
October 3, 2020

BeyondTrust completes ISO 27001 Certification and SOC 2 Type 1 audit

Achievement of these security milestones included a broad scope of BeyondTrust systems, including its internal controls and Endpoint Privilege Management (EPM) and Secure Remote Access (SRA) product portfolios.
by | 2 min read
September 22, 2020

CyberKnight becomes official distribution partner for MENA ISC 2020

To address the growing cybercrime challenges, as well as, support the Kingdom’s 2030 Vision, CyberKnight has established its legal entity in Riyadh with deployment of local sales and technical resources on-the-ground.
by | 2 min read
September 21, 2020

Maze tries to execute $15M ransomware attack: Three strikes, and Maze was out

The investigation revealed that the attackers had penetrated the network at least six days before their first attempt to launch the ransomware payload. During this time, the attackers explored the network, ran legitimate third party tools.
by | 2 min read
September 14, 2020

Acronis survey reveals global cyberprotection needs upgradation

The challenge for organizations is that managing the protection of data across the company network and all of those new devices using a stack of different solutions is expensive, time-consuming, and complicated.
by | 3 min read
September 10, 2020

Attackers impersonating major brands domains to scam consumers

We also ranked the Top 20 most abused domains in December 2019 based on the adjusted malicious rate, which means that a domain is either a target of many squatting domains or most of these squatting domains are confirmed malicious.
by | 3 min read
September 10, 2020

Sophos announces its top performing channel partners in MEA

Every year, Sophos recognises partners across the Middle East and Africa that went above and beyond to sell Sophos’ solutions, including synchronized security, and developed a deeper level of expertise to strengthen customer defenses against cyberattacks.
by | 2 min read
September 7, 2020

Intelligent protection against DNS DDoS attacks

The COVID-19 pandemic was the genesis of this new opportunity as the disease continues to impact businesses and economies worldwide. The net result is that 2020 has become the year of the teleworker. The use of online services from home and other remote locations became more critical than ever. Students are online.
by | 3 min read