Find

September 18, 2020

Addressing insider threats at financial institutions during remote work

Almost anyone can become an insider threat – all it takes is access to sensitive information, or simply access to the building where those resources are located, whether the individual works for the company or not. Former employees, consultants, board members, or current employees are good examples. So are janitors.
by | 4 min read
September 15, 2020

Newcom Computer Systems signs distribution agreement with ST Engineering in ME

Newcom Computer Systems UAE is pleased to announce that they have inked a distribution contract with the Cybersecurity business of ST Engineering to distribute and market its three cybersecurity encryption products, the BIOS-SHIELD™, DISKCRYPT™ and NETCRYPT™, in the Middle East
by | 2 min read
September 15, 2020

Proofpoint Enterprise DLP solution helps organizations to quickly respond to data loss

Proofpoint, Inc. announced multiple new Proofpoint innovations to ensure that organizations worldwide have end-to-end protection around their people—wherever and however employees are working and collaborating.
by | 2 min read
September 14, 2020

Acronis survey reveals global cyberprotection needs upgradation

The challenge for organizations is that managing the protection of data across the company network and all of those new devices using a stack of different solutions is expensive, time-consuming, and complicated.
by | 3 min read
September 9, 2020

Proofpoint announces new advancements in Security Awareness Training Platform

Available in Q4 2020, the platform will integrate more closely with Proofpoint’s best-in-class threat intelligence to make it easy for security teams to identify people-centric risk and assign training to targeted users while introducing new customization functionality.
by | 2 min read
September 8, 2020

Winners announced in $1m Mohammed bin Rashid Initiative for Global Prosperity

More than 6,800 social impact enthusiasts from around the world came together to witness the Global Maker Challenge finalists pitch their solutions, listen to expert-led discussions and keynotes, and watch the award ceremony, as part of the #Make4ProsperityWeek.
by | 4 min read
September 7, 2020

Proofpoint and CyberArk extend partnership to protect high-risk users

The Proofpoint and CyberArk partnership features a combination of layered defenses designed to stop threats before they reach users and apply policies and controls that ensure privilege accuracy.
by | 2 min read
September 7, 2020

Cloud Box Technologies unveils new security practice to develop its portfolio

The portfolio of cyber security services from CBT now includes system protection, network and data protection, cloud security, identity and access governance, and managed and professional security services.
by | 2 min read
September 3, 2020

Think 3,2,1 to protect your data against ransomware attacks

The 3-2-1 rule recommends that there should be at least three copies of important data, on at least two different types of media, with at least one of these copies being off-site. The best part is that this rule does not demand any particular type of hardware and is versatile enough.
by | 4 min read
August 31, 2020

Help AG new solution supports organizations secure remote employees

The overnight shift of millions of workers from on-site to remote work has drastically increased the cyberattack surface making critical assets more vulnerable to unauthorized access and existing security infrastructure.
by | 2 min read