Find

February 7, 2024

4 Protections Against Password-Spray Attacks

By: Morey Haber, Chief Security Officer, BeyondTrust Nothing reinforces the […]
by News Desk | 4 min read
January 23, 2024

Trend Micro Unveils Next-Gen Email Security

Trend Micro Incorporated , a prominent player in the field […]
by News Desk | 2 min read
January 23, 2024

Acronis Transforms Cybersecurity With Integrated Technologies

Acronis, a global frontrunner in cyber protection, has unveiled a […]
by News Desk | 2 min read
January 18, 2024

Cyber-Attacks Top Business Outage Causes: Veeam

Veeam Software, a leader in Data Protection and Ransomware Recovery, […]
by News Desk | 2 min read
January 12, 2024

63% In UAE Can Not Distinguish Deepfakes

Based on the findings of the Kaspersky Business Digitization survey, […]
by News Desk | 2 min read
January 10, 2024

Google Cloud: 2024 Cybersecurity Trends

Google Cloud has released its annual Cybersecurity Forecast report for […]
by News Desk | 3 min read
January 8, 2024

How Telecommunications Providers Can Best Tackle DDoS Attacks

Amr Alashaal, Regional Vice President – Middle East at A10 […]
by News Desk | 3 min read
December 19, 2023

SpyLoan apps on Android: Loan sharks expand reach

This year, ESET researchers have detected a concerning surge in […]
by News Desk | 2 min read
December 6, 2023

Organizations Face $2.3M Annual Losses from Cloud Breaches

Insufficient security measures in the realm of cloud computing are […]
by News Desk | 2 min read
November 8, 2023

The six stages of ransomware — how to spot the signs and thwart your foes

By Vibin Shaju, VP Solutions Engineering EMEA, Trellix Ransomware. It […]
by News Desk | 4 min read