VELOCITY - DATA AND ANALYTICS SUMMIT

cyberattack - search results

If you're not happy with the results, please do another search
53%-Of-UAE-Cybersecurity-Professionals-Feel-They-Are-Fighting-A-Losing-Battle-Against-Cybercriminals

53% of Professionals Say Its a Losing Battle Against Cybercriminals

Despite increasing budgets and greater-than-ever support from senior management, SecOps teams report persistent silos and meagre capabilities amid an escalating threat landscape Most UAE-based cybersecurity...
Barracuda-Bolsters-Its-Zero-Trust-Access-Solution-With-Integrated-Web-Security-Functionality

Barracuda Bolsters Its Zero Trust Access Solution With Integrated Web Security Functionality 

Barracuda, a provider of cloud-first security solutions, announced that CloudGen Access, now transactable on AWS and Azure marketplaces, has been expanded with new functionality. As...
Solving-Today’s-Security-Challenges-Requires-A-New-Approach--(Interview--Tim-Erridge)

Solving Today’s Security Challenges Requires A New Approach 

Datatechvibe spoke with Tim Erridge, Head of Palo Alto Networks' Unit 42, EMEA, about the detection methods for understanding fraudulent activities, training programmes organisations...
How-Do-You-Measure-The-Success-Of-Digital-Transformation-(Velocity-KSA)

How Do You Measure The Success Of Digital Transformation?

We asked five industry leaders about how enterprises can measure the impact of digital transformation on business goals and investment ROIs The pandemic served as...
A-Reliance-On-Legacy-Technology-Is-Undermining-How-Organisations-Respond-To-Ransomware

A Reliance On Legacy Technology Is Undermining How Organisations Respond To Ransomware

New global research commissioned by Cohesity, reveals that nearly half of respondents say their company depends on outdated, legacy backup and recovery infrastructure to manage...
The 9 Cs Of Cybersecurity For The Modern Business

The 9 Cs Of Cybersecurity For The Modern Business

Arab Gulf nations’ reputations for technological prowess are well deserved. From cloud to mixed reality and AI to IoT, GCC governments and businesses have...
BeyondTrust-Introduces-New-Intelligent-Identity-and-Access-Security-Platform

BeyondTrust Introduces New Intelligent Identity and Access Security Platform

BeyondTrust, the intelligent identity and access security provider, announced the BeyondTrust Platform, featuring a modern architecture that delivers unprecedented visibility of identities and access...
The-Digital-Certificate-Conundrum

The Digital Certificate Conundrum

Attacks on the telecoms industry underscores the need for proper machine identity management Just last month, the US Cybersecurity and Infrastructure Security Agency (CISA) sent...
Cybereason-Launches-Industry’s-First-MDR-Mobile-App

Cybereason Launches MDR Mobile App 

With the Cybereason MDR Mobile App, defenders can further reduce the mean-time-to remediation by suspending an attack's lateral movement directly from their mobile device. Cybereason,...
Palo-Alto-Networks-Unit-42-Launches-MDR-Service

Palo Alto Networks Unit 42 Launches MDR Service

New MDR service uniquely combines industry-leading Cortex XDR technology with Unit 42's advanced threat intelligence and threat hunting. The need for managed detection and response...

Latest Posts