
Arrival of the evolved ransomware attack
Digital technologies are continuously improving the functionalities of business solutions, and cyber security is no different. Mandiant Automated Defence combines data from

Network reliance reaches highest ever point in 12 months
Digital transformation has been crucial for enhancing the security and resilience of networks for UAE enterprises. Today’s digital landscape comes with various

Security should be intelligent, automated, everywhere
Today’s exponential data growth, rise of multi-cloud strategies and modern applications have created new challenges requiring businesses to ensure that every part

High integration, automation, and orchestration capabilities
While the digital technologies have helped businesses become more agile and data more accessible, they are also bringing unprecedented levels of disruption.

CISOs must re-evaluate policies aligning with business
Cloud Box Technologies provides IT Solution to large Corporates, government and BFSI sectors with years of technical expertise in Middle East and

Using AI to sort 1 million security alerts per week
With so many threats and so few resources, any tech that helps security teams focus on security and not overhead or noise

Making robust email-security available to all businesses
Cybersecurity is essential. But at Barracuda we believe that the key challenges CISOs face with security solutions – complexity, cost, management overheads

Using AI for behavioral malware is a powerful defense
Acronis has developed a unique and holistic approach to cyber protection composed of five vectors: Safety, Accessibility, Privacy, Authenticity and Security SAPAS.

Most critical technology is attack surface identification
Axon Technologies offers a holistic approach to cybersecurity by considering the complete Threat Landscape and then scoping the solutions to fit. Axon

Focus on better outcomes from a security protection programme
When an organisation suffers a data breach or other cybersecurity incident, it is not judged by whether it had a low number

Defending APIs is now a tier-one security priority
Applications are everywhere, from datacentres to smart phones. Remote working has increased the need for more applications to be exposed to the

Why visibility into encryption is becoming important
Encryption is growing at a steady rate. This term that was once associated primarily with clandestine cyber operations has now gone mainstream

