Find

October 3, 2020

BeyondTrust completes ISO 27001 Certification and SOC 2 Type 1 audit

Achievement of these security milestones included a broad scope of BeyondTrust systems, including its internal controls and Endpoint Privilege Management (EPM) and Secure Remote Access (SRA) product portfolios.
by | 2 min read
October 3, 2020

Credence Security signs new partnership with ColorTokens in MEAI region

As targeted attacks and insider threats become more common across the region, protecting the corporate perimeter is no longer sufficient. ColorTokens has adopted a Zero Trust approach designed to protect enterprise.
by | 2 min read
September 19, 2020

Italy launches InnovItalyUAE to strengthen cooperation with UAE

The initiative, organized with the Khalifa University of Science and Technology and in collaboration with the Dubai Future Foundation, will be on the following sectors: cybersecurity, space research, smart cities, life sciences, food technologies, renewable energy and circular economy.
by | 2 min read
September 15, 2020

Passwordless administration and effective endpoint security strategy

The concept of passwordless administration is generally linked to just-in-timePAM, since the methods of applying passwordless administration can cover several technologies to temporarily elevate the user or the application for the specific requested task. In other words, in lieu of entering secondary administrative credentials, the user is trusted based on context.
by | 4 min read
August 29, 2020

Smart cities are exciting — until there’s a cybersecurity snafu

Smart cities preceded COVID-19, of course, built on the concept of digital municipal systems that do everything from controlling traffic grids and ensuring water quality to promoting online voting. This was already a high growth market segment. Research conducted pre-pandemic indicated that a staggering $189 billion would be spent worldwide on smart cities.
by | 5 min read
August 25, 2020

Acronis True Image 2021: A complete personal cyber protection solution

Incorporating cybersecurity capabilities such as real-time antimalware protection, on-demand antivirus scans, web filtering, and videoconference protection into Acronis True Image ensures users have complete cyber protection.
by | 3 min read
August 20, 2020

ESET highly commended in KuppingerCole Market Compass 2020 report

KuppingerCole Analysts is an international and independent analyst organization that supports companies, corporate users, integrators and software manufacturers in meeting both tactical and strategic challenges.
by | 2 min read
July 29, 2020

GDPR turns two years old! Has it changed anything?

According to a 2019 report by the Ponemon Institute, the Middle East ranks as the world’s second-highest cost of data breaches, at USD 6 million per breach.
by | 4 min read
July 9, 2020

75% of UAE organizations experience public cloud security incidents

According to The State of Cloud Security 2020, a global survey from Sophos, three quarters (75%) of organizations from the UAE experienced a public cloud security incident in the last year.
by | 2 min read
July 8, 2020

CyberKnight and Armis to bring agentless EDR to OT, IoT, and ICS

Ripple20 could allow attackers to easily take over smart devices, while attacks are possible via the internet or from local networks.
by | 2 min read