Home Technology Cybersecurity

Cybersecurity

Cybercriminals are using AI to scam shoppers during Black Friday Cyber Monday sales Getty Images

Black Friday: How cyber crooks are using AI to scam consumers

Here are simple tips to help you shop safely during the shopping season

How regtech tools can enhance compliance and security

Cover story: How regtech tools can help UAE-based entities enhance compliance and security

NorthLark’s Eshana de Silva tells Gulf Business that regtech promises to marry the new landscape of post-financial crisis regulation to the new landscape of digital technologies

ransomware

China’s biggest lender ICBC hit by ransomware attack

Several ransomware experts said an aggressive cybercrime gang named Lockbit was believed to be behind the hack

Cybersecurity

Interview: Positive Technologies maps cybersecurity trends in MENA

Cybersecurity threats have grown in scope and size with government and enterprises having to adopt a comprehensive approach to protect their digital assets

Illumio Zero Trust Approach

Illumio’s Trevor Dearing explains the critical need for a Zero Trust Approach in times of AI

As the MENA region faces a rise in cybercrime, Illumio explains how a ‘Zero Trust’ approach can help protect enterprises at scale

Trend Micro cybersecurity

Cybersecurity: Evolving threats for enterprise ecosystems

The mass of adoption of AI has opened up opportunities and challenges for enterprises as they are faced with new cybersecurity challenges

cybersecurity

GITEX Global 2023: Seclore combines cybersecurity with data-centric solutions

The Middle East witnessed a 77 per cent increase in ransomware activities in the first quarter of 2023, highlighting the need for significant cybersecurity investments by enterprises

UAE Cyber Security Council issues alert Google Chrome users asked to update software Image Getty Images

UAE Cyber Security Council issues important alert, Google Chrome users asked to install update

The authority said that an urgent security vulnerability has been detected in Google Chrome on October 3

Mohamed Amine Belarbi of Cypherleak Image Supplied

Hub71-based Cypherleak raises $750,000 in seed round

Cypherleak allows companies to track their leaked passwords and information on both the public web and dark web

Cisco Splunk

Cisco to buy Splunk in $28bn deal

Splunk president and CEO Gary Steele will join Cisco’s executive leadership team

Kuwait Cyberattack

Kuwait: Finance Ministry says cyberattack hit one of its systems

The ministry has been in contact with National Cybersecurity Center for updates and assessment of the hack

physical security

Why physical security and cybersecurity should go hand-in-hand

A look at how organisations can shore up their cyber defences with the help of physical security protocols

Physical Security

Insights: Exploring career paths in the evolving physical security industry

Physical security industry will require a diverse workforce populated by multifaceted individuals with varied backgrounds who can demonstrate the strategic acumen, technical knowledge and analytical skills

cybersecurity

Insights: How to spot AI ‘snake oil’ in cybersecurity

Organisations often overlook vital inquiries about AI despite their understanding and use of predictive analytics and other advanced technologies

Travel tips

Insights: Safeguarding against online identity theft during travel

We look at top eight cyber travel tips to keep in mind when travelling

Cybercrime laws Image Getty Images

UAE data laws: Cybercrime offenders to face up to 5 years in prison, huge fines

This is according to Article 8 of Federal Decree Law no. 34 of 2021, on combatting rumours and cybercrimes

Tesla

Tesla data breach blamed on ‘insider wrongdoing’ impacted 75,000

The people appear to be current or former employees of the Austin, Texas-based automaker

Business email compromise

How companies can defend against business email compromise

Strategies that firms should follow to build security into their business processes

integrated cyber defence

Help AG’s Stephan Berner on the importance of integrated cyber defence

The integrated approach to cyber defence is one of the technology trends that will dominate in coming years, says the CEO of the company

Dubai bolsters its cybersecurity strategy

Dubai launches second cycle of its cybersecurity strategy

The city has emerged as a global leader in cybersecurity by implementing secure digital systems and adopting advanced technical solutions

EDGE expands portfolio with acquisition of Oryxlabs

EDGE expands portfolio with acquisition of Oryxlabs

The acquisition is expected to elevate the defence group’s portfolio of advanced technology solutions

Cyber Week

Cyber Week 2023: Top cybersecurity experts gather to discuss latest trends

The annual cybersecurity event, hosted at Tel Aviv University, successfully concluded its 13th conference last month

Zero trust

Zero trust is top cloud security priority for next year, research finds

‘Future of Cloud Security in the Middle East’ report found that security experts would prioritise zero trust strategies ahead of data and privacy and compliance

Al Kuwaiti

Dr Al Kuwaiti leads UAE delegation at Cyber Week, highlighting UAE-Israel cyber alliance

Cyber Week is an annual international cybersecurity event, hosted at Tel Aviv University in Israel for last 12 years

sustainable development

How cybersecurity is helping global sustainable development

Cybersecurity requires a holistic view of the many different factors that contribute to our digital security, says Kaspersky

artificial intelligence

The impact of artificial intelligence developments on cybersecurity

In order to thwart potential cyberattacks and better protect businesses and individuals against cyberthreats, security players are closely monitoring developments in AI

Renault

Renault-led concept car offers cyberattack protection

The system will be available with the future Renault 5, which is expected to go on sale next year

wearable device

How wearable device manufacturers can ensure end-to-end security

One of the main challenges of securing wearable devices is that they are often connected to other devices, weaving a complex network with endless entry points for cybercriminals

META cyber threat and hacker attack

Here’s why the META region is prone to mobile financial scam

Cyberthreats for Android users remain prevalent in the META region as the operating system holds a dominant market share

ransomware

Top 12 tips to keep your business safe from cyberattacks

While there is no way to guarantee that an organisation will never be attacked, they can take some simple steps to protect their business