Home Technology Cybersecurity

Cybersecurity

Gartner privacy 2024

Top five privacy trends to protect personal data challenges through 2024

By 2024, 75 per cent of the global population will have its personal data covered under privacy regulations

cyber resilient

Here’s how to build a cyber resilient organisation

Hany George, security specialist for Mimecast Middle East shares the most effective ways of strengthening an organisation’s overall cyber resilience

Higher education cybersecurity

Why higher education should care about cybersecurity

A wave of cybercrime is hitting educational institutions and criminals are developing sophisticated digital attacks to steal intellectual property

Entrust Cyberknight

Entrust onboards CyberKnight as new distributor for Middle East Region

The partnership will see the two companies jointly build solutions for the Middle Eastern market

Dubai SME leverages fintech to support start-ups in partnership with Beehive

BlackBerry partners with Midis Group to drive growth in Eastern Europe, the Middle East, and Africa

Midis Group will focus on driving growth for BlackBerry’s cybersecurity business unit

UAE ransomware

Over 59% of UAE organisations surveyed were hit by ransomware in 2021 – research

The average cost to recover from the most recent ransomware attack in 2021 was $1.26m

Financial

Is the financial sector still on cybercriminals’ radars?

The New York Federal Reserve noted a report that financial firms experience cyberattacks 300 times more than other industries

Huawei ICT infrastructure

Huawei’s take on how ICT infrastructure can curb energy consumption

In an interview with Gulf Business, David Shi, president, Huawei Enterprise Business Group, Middle East highlights how the need for greener ICT infrastructure is a priority for organisations

Dragos

How cybersecurity firm Dragos is at the forefront of addressing industrial cyberthreats

Cyberattacks targeting critical industries such as power, oil and gas, mining, can be motivated by more disruptive or destructive intents

Tenable Bit Discovery

Tenable to acquire external attack surface management vendor

Tenable will acquire Bit Discovery for a total purchase price of $44.5m in cash

Comodo distilogix

Comodo Security Solutions partners with UAE-based Distilogix

Both companies aim to assist organisations in moving to a modern and full-proof approach to protecting themselves from cyberattacks and security breaches

Getty Images - Sophos acquisition

Sophos acquires UK-based Soc.Os to advance MTR, XDR capabilities

The deal expands Sophos’ adaptive cybersecurity ecosystem to include telemetry from third-party security and IT solutions

Getty Images - Saudi office

Kaspersky opens new office in Saudi Arabia

Establishing this new office in the kingdom is a milestone in the company’s roadmap to protect over 400 million users

Why Thales believes cybersecurity should be seen as a business enabler

With the increase in the cyberthreat landscape, urgent action is needed by businesses to develop more robust strategies, says Emmanuel de Roquefeuil, VP, Thales – Middle East

Getty images

Cybersecurity: Are we doing it the right way?

With malicious attackers continuing to pick new attack vectors, cybersecurity leaders need to reinvent their security strategy to defend this expanded threat surface

Cybereason hires Hussam Sidani to lead Middle East and Turkey operations

Sidani joins the company with more than 20 years of security experience, having most recently led Gulf, Levant, and Africa sales for FireEye

Getty Images

Help AG, Waterfall Security Solutions partner to strengthen industrial cybersecurity in the UAE

Help AG’s industrial clients will benefit from Waterfall’s unidirectional security gateways to tackle the security challenges involved in IT-OT convergence

SAFCSP and Spire Solutions ink partnership for capacity building in Saudi Arabia

The partnership aims to support Saudi youth by providing a series of short courses on some of the latest cybersecurity technologies

Lapsus$, Microsoft and Okta: Cybergeddon or cyber non-events?

The business typically seeks efficiency while those who worry about availability need redundancy

Zero trust: A vital component in the strengthening of hybrid-work capabilities

A zero trust defensive strategy aims to make the organisation’s network software-defined, boost resilience and flexibility, and combat modern-day threats

Help AG becomes a Microsoft partner in the GCC

The partnership will enable Help AG to provide services based on all Microsoft security products, including Microsoft Sentinel and Defender

Cybersecurity firm Dragos announces opening of Dubai office

The office houses industrial cybersecurity staff and training centre

Microsoft confirms hacker group Lapsus$ breached its systems

The hacking group has been expanding the geographic range of its targets

Resecurity introduces dark web intelligence in Saudi Arabia

The US-based company recently exhibited their solutions and shared their expertise at the World Defense Show in the kingdom

In pics: Commander-in-chief, Dubai Police, opens Gisec Global 2022

More than 300 global cybersecurity brands are showcasing technologies at the event

Acronis appoints Ziad Nasr as general manager for Middle East

Nasr brings 22 years of experience in sales and operations management in the information technology industry

Cybersecurity

Businesses should recalibrate their cybersecurity approach around these elements

Businesses now require the right architecture which creates a framework for a stable security platform says Thorsten Freitag, VP of Sales – EMEA at Check Point Software Technologies

Gisec Global 2022 to drive industry fightback against cyberthreats

100 ethical hackers to find and fix security flaws in electric cars, smartphones and drones at Gisec Bug Bounty programme

Unsplash images

Google to acquire cybersecurity firm Mandiant for $5.4bn

Google will purchase Mandiant for $23 a share in an all-cash deal, according to a statement

Getty Images

Gartner identifies top security and risk management trends for 2022

Security leaders must evolve strategies to protect an expanding digital footprint against emerging threats