Over the last few years the topic of cyber security has moved from the IT department to the board room. The current climate of geopolitical and economic uncertainty has made the threat
Despite three straight years of ongoing disruption and economic ambiguity, when it comes to resiliency, 53% of executives admit their company is not where it should be. This is among the top
Barracuda Networks, Inc., has announced a distribution agreement with Ingram Micro for the Gulf region. The relationship enables Ingram Micro to offer Barracuda’s complete portfolio of email, application and cloud, network, and data
Gartner research shows that attack surface expansion is the number one trend for increasing potential cyber threats. Not only that, but according to the Enterprise Strategy Group’s research report on security hygiene
NETSCOUT SYSTEMS, a leading provider of performance management, cybersecurity, and DDoS protection solutions, today announced findings from its 5th Anniversary DDoS Threat Intelligence Report that point to a new era of multi-vector
In 2022, Kaspersky blocked 507 million user attempts to follow malicious phishing links. During testing carried out among employees in the Middle East, Turkey, and Africa region, employees most often fell victim
Kaspersky announced an updated version of its Kaspersky VPN. The new version includes a Wireguard protocol for a more protected and transparent connection. Other features added are a dark mode and new
Sophos, a global leader in innovating and delivering cybersecurity as a service, today published a new survey report, “The State of Cybersecurity 2023: The Business Impact of Adversaries on Defenders,” which found
Veeam® Software, the leader in Modern Data Protection, has enhanced its ProPartner Network strategy with the launch of the Veeam Competency Program for Veeam Value-Added Resellers and Veeam Cloud & Service Provider
A phishing attack is a targeted, fraudulent communication that appears to come from a reputable source. Email phishing occurs when attackers trick legitimate users with proper access credentials into taking action that