Find

June 13, 2022

Attacker dwell time increased by 36%, reveals Sophos

Sophos, a global provider of next-generation cybersecurity, has released the "Active Adversary Playbook 2022," which details attacker behaviors observed in the wild by Sophos' Rapid Response team in 2021.
by News Desk | 4 min read
June 9, 2022

Lack of collaboration between IT and security teams puts businesses at risk

New research commissioned by Cohesity, a provider of next-gen data management, reveals that while most IT and security operations (SecOps) decision-makers believe they should jointly share the responsibility.
by News Desk | 3 min read
June 9, 2022

Attacks on healthcare organizations grew by 94% in 2021, according to Sophos

More healthcare organizations (78%) are now opting for cyber insurance, but 93% of healthcare organizations with insurance coverage report that getting policy coverage has become more difficult in the last year. With ransomware being the single most common cause of insurance claims, 51% of respondents reported that the level of cybersecurity required to qualify is higher.
by News Desk | 2 min read
June 8, 2022

Going passwordless in today’s business venture – How secure is it?

A recent Information Age article further claims that the time is right for passwordless authentication, as “passwordless authentication makes users’ lives easier” and removes the human factor from cybersecurity — where “people just can’t be trusted to set reliable passwords, to change them frequently, to make sure they are strong, and to keep them secure.”
by News Desk | 5 min read
June 3, 2022

5 ways data-loss prevention enhances the XDR value proposition

The scale of the threat landscape is staggering. How long did it take you to read to this point? Compare that to the estimate that every 40 seconds, somewhere in the world, a cyberattack occurs. For the region’s security leaders, it is difficult to shake off the feeling that such an attack could happen to their organization tomorrow.
by News Desk | 4 min read
June 2, 2022

LinkedIn and WhatsApp used to attack aerospace and defense contractors

According to ESET telemetry, Lazarus targeted companies in Europe (France, Italy, Germany, the Netherlands, Poland, and Ukraine) and Latin America in the relevant 2021-2022 attacks (Brazil).
by News Desk | 2 min read
June 2, 2022

Tech making financial services more accessible for people with disabilities

The study, Bridging the Disability Gap: An Opportunity to Make a Positive Impact, reveals that for people with disabilities, digital inclusion is the path to financial inclusion. Governments' adoption and prioritization of policies to improve service accessibility paves the way for public and private sector financial institutions, mobile network operators (MNO), fintech providers, and other organizations to develop and implement solutions.
by News Desk | 4 min read
May 20, 2022

The importance of threat intelligence for enterprise security

According to a 2021 survey by PwC, cybersecurity is a growing concern for organizations, with approximately 43% of Middle East CEOs planning to increase investments in cybersecurity and data privacy by 10% or more over the next three years. Moreover, 41% of these leaders think that their organization should be doing more to measure cybersecurity.
by News Desk | 2 min read
May 18, 2022

Axon launches virtual ethical hacking and penetration testing course

The course, led by Abed Samhuri, Cyber Institute Lead at Axon Technologies, is open to all who want to advance their network security skills and validate their industry knowledge.
by News Desk | 2 min read
May 5, 2022

World Password Day – Readying your workforce for MFA

MFA, an acronym for Multi-Factor Authentication, is considered one of the strongest methods of authentication. Microsoft estimates that MFA defeats 99% of authentication based attacks. While not fool-proof, MFA is one of the most effective steps organizations can take to dramatically reduce the risk of a breach. At its simplest level, MFA is multiple levels of authentication.
by News Desk | 5 min read