What a difference six months makes. Back in June 2025, when I stood on the stage at the face-to-face SECON conference, the energy in the room was electric. We shook hands, we
As part of a strategic collaboration, e& UAE, the flagship telecom arm of global technology group e&, in partnership with ZTT, a leading provider of advanced fibre optic solutions, today announced the
ServiceNow, the AI control tower for business reinvention, has entered into an agreement to acquire Armis for $7.75 billion in cash. Armis, a leader in cyber exposure management and cyber-physical security, manages
Cisco has announced the launch of Cisco IQ, a breakthrough AI-powered digital interface that brings real-time insights, on-demand assessments, troubleshooting and personalised learning, automation and agents from across professional services and support
BeyondTrust, global leader in identity security protecting Paths to Privilege, has announced its top cybersecurity predictions for 2026 and beyond, identifying the trends that will redefine how organizations protect identities, secure data, and
New research from Infoblox Threat Intel shows that parked domains – long treated as harmless and forgotten ad pages – have become a reliable tool for malicious actors. In large‑scale experiments, over
It came as a surprise that this is the 10th time that we’ve looked at the technology trends that we think will affect the security sector in the coming year. It feels
In the recently published Hybrid Cloud Middle East and Pakistan Survey Results 2025 from Omdia, a global analyst and advisory leader, Huawei Cloud Stack achieved the highest overall score in the market
Nutanix has announced new capabilities in its Nutanix Cloud Platform (NCP) solution designed to give organizations greater flexibility to deploy and govern their infrastructure across distributed environments running traditional, modern, and AI applications,
The rapid progress in quantum computing is reshaping long-term security planning. While today’s quantum computers cannot yet break widely used cryptographic algorithms, their future potential creates an urgent need to transition to