Find

July 21, 2022

Building a trustworthy team can help CSOs get a good night’s rest, says Morey Haber

The most pressing cyber security concerns facing organizations today are the rapidly evolving threat landscape in the cloud and attacks targeting assets that are no longer secured by a perimeter defense strategy.
by News Desk | 3 min read
June 22, 2022

Six challenges today’s CISOs face when protecting corporate identities

The rise of the Internet of Things has led to an explosion in machine accounts. And the Arab Gulf’s pioneering adoption of 5G suggests that IoT use cases will soon increase in number. This leads regional organizations into a new hornet’s nest of identity problems. The accounts for things like services and application pools are not identities.
by News Desk | 4 min read
May 26, 2022

Elevation of Privilege was the #1 vulnerability category in 2021: Report

The Common Vulnerability Scoring System (CVSS) captures the main characteristics of a vulnerability and generates a numerical score indicating the severity level of the vulnerability, ranging from 0 to 10.
by News Desk | 2 min read
March 16, 2022

5 tips for managing privileged shared accounts

GCC nations have established themselves, of late, as leaders in cyber-readiness. Saudi Arabia was ranked second and the United Arab Emirates was fifth, in the International Telecommunication Union’s Global Cybersecurity Index of 2020. The UAE made particular strides, having leapt from 33rd in the 2019 edition of the index. And yet both Gulf nations saw spikes in cyber incidents.
by News Desk | 3 min read
February 16, 2022

Tenable Technology Ecosystem reaches 100 Partners

Tenable announced its Technology Ecosystem has reached 100 partners and 200 unique integrations. Available for free with all Tenable products, the expanded Ecosystem streamlines the vulnerability management process for customers by allowing them to integrate Tenable’s visibility and insights with other security applications in their environment, said a company statement.
by News Desk | 2 min read
November 23, 2021

The 5 management ‘musts’ of M2M identity security

In pursuit of M2M security, forget the user entirely. Endpoint privilege management tools adjust user privileges at runtime for applications and processes. They apply policies to the process, taking the user out of the equation, and so we are again dealing with machine identity. Such tools apply the policy of least privilege (PoLP) approach to each application or process.
by News Desk | 3 min read
May 4, 2021

Forcepoint announces three new appointments to Board of Directors

The new board members include BeyondTrust CEO Matt Dircks, Teleo Capital Operating Partner John McCormack, and Redhorse Corporation President Dr. John Zangardi
by | 3 min read
March 21, 2021

Here’s how TECHx celebrated International Women’s Day 2021!

With more women taking on leadership positions in technology, TECHx, in association with Lexar, launched a #WomenInTech campaign to recognize and celebrate inspirational women who have made significant contributions to the ICT industry in the region.
by | 2 min read
March 17, 2021

56% of Microsoft vulnerabilities can be mitigated by removing admin rights

The BeyondTrust Microsoft Vulnerabilities Report, produced annually by BeyondTrust, analyzes the data from security bulletins publicly issued by Microsoft throughout the previous year.
by | 2 min read
February 4, 2021

Five essential steps in your endpoint security strategy

With 70% of successful breaches starting at the endpoint, it’s imperative that security teams take a comprehensive, preventative approach to protecting all of the endpoints in the organization.
by | 4 min read