Freedom of Choice for identity governance deployment

SailPoint Technologies Holdings has unveiled the company’s comprehensive delivery strategy that provides deployment options for their identity governance platform, spanning: software-as-a-service, in the public cloud, in their own data center or from a managed service provider....

Read More
Unreliable VPNs highlight the dangers of remote working

Over half of remote workers spend up to one day a week connected to unsecured networks.

Read More
NEWS
Proofpoint completes Wombat acquisition

Proofpoint has completed its acquisition of Wombat Security Technologies, Inc., a leader for phishing simulation and security awareness computer-based training. By collecting data from Wombat’s PhishAlarm solution, Proofpoint will have access to data on phishing campaigns as seen by...

Read More
NEWS
Organisations slow to change after cyber attacks

CyberArk survey findings show organisations are failing to secure privileged accounts and credentials in the cloud, on endpoints and across IT environments.

Read More
Report focuses on ransomware and malware threats

KnowBe4, the world’s largest provider of security awareness training and simulated phishing, has...

Read More
NEWS
Disparity between IoT adoption and cybersecurity readiness

Trustwave has released the “IoT Cybersecurity Readiness Report” which assess the current and...

Read More
Fortinet delivers third generation of network security

FortiOS 6.0 delivers more than 200 new capabilities across Security Fabric to automate security...

Read More
Splunk agrees to acquire Phantom

Splunk Inc. is to acquire Phantom Cyber Corporation, a leader in Security Orchestration,...

Read More
NEWS
du selects Fortinet

UAE-based telecommunications service provider du – from Emirates Integrated Telecommunications...

Read More
NEWS
CrowdStrike Global Threat Report reveals the biggest cyber crime and targeted intrusion trends

Following the trickle-down effect of advanced ‘military-grade’ tools, report uncovers...

Read More
Trustonic launches IoT device security solution

Blockchain-based Digital Holograms, trusted device provisioning and a modular, secure OS combine to...

Read More
NEWS
Shop Direct automates cyberattack detection with Vectra

The United Kingdom’s second-largest pureplay digital retailer uses artificial intelligence to...

Read More
NEWS
Email attacks continue to cause headaches

Over one-third of all security incidents start with phishing emails or malicious attachments sent...

Read More
NEWS
Costs not customers the major security breach concern

Sixty-three per cent of C-suite more concerned about paying for the costs of a cybersecurity...

Read More
NEWS
Security threats - beyond the reach of humans?

Cisco 2018 Annual Cybersecurity Report reveals that 39 percent of organizations are reliant on...

Read More

Videos

Avi Baum, CTO at Hailo, discusses why AI infrastructure needs are already shifting from centralized to edge, how telcos can evolve and future-proof their business to keep up with that transition, and what’s...
Steve Wilson, Chief AI and Product Officer at Exabeam, discusses the company’s recent report, From Hype to Help: How AI Is (Really) Transforming Cybersecurity in 2025, explaining that there’s no shortage...
Michelle Buckingham, VP of Channel at IFS, discusses the company’s recent acquisition of TheLoops and its recent collaboration with TomTom before explaining how IFS is building a digital-first partner...
Prakash Govindan, Gradiant’s co-founder and COO, discusses the challenges facing both the data centre and semiconductor industries when it comes to water usage. The company is currently working with two data...

Expert Opinions

The Middle East is undergoing a huge shift in its engineering and infrastructure sectors, with chapmanbdsp perfectly poised at the centre of the region’s transformation.
By Tony Hasek, CEO & Co-founder, Goldilock Secure.
By Matt Sherwen, Managing Director of Sherwen Studios.
By Troels Rasmussen, GM of Security, N-able.