VELOCITY - DATA AND ANALYTICS SUMMIT

Data

The-Rise-Of-Botnet-And-DDoS-Attacks

The Rise Of Botnet And DDoS Attacks

Distributed Denial of Service (DDoS) attacks have become an ongoing threat to organisations. Using a variety of techniques, a wide range of threat actors, from...
Zero-Trust-In-Storage---Protecting-The-Bulwark

Zero Trust In Storage – Protecting The Bulwark

Seventy-three per cent - that's the percentage of organisations that have been affected by at least two ransomware attacks in the past year, according...
What-The-Shift-To-Cloud-native-Technologies-Means-For-Digital-Transformation-Strategies

What The Shift To Cloud-native Technologies Means For Digital Transformation Strategies 

There is widespread consensus in the IT industry across the region that we’re entering an exciting new era of innovation. Technologists are beginning to...
Living-off-the-land-Attacks-are-A-Tough-Nut-To-Crack,-But-By-No-Means-Impossible

Living-off-the-land Attacks Are A Tough Nut To Crack, But By No...

Across the region, cybersecurity leaders face growing complexity in their IT suites and an often understaffed and under-skilled SOC. But these factors present such a...
The-Next-Wave-Of-Ransomware

The Next Wave Of Ransomware

Ransomware as a trend will continue to affect businesses across the world – with attack types and tactics from cybercriminals evolving all the time....
The-Case-For-Risk-based-Cybersecurity

The Case For Risk-based Cybersecurity

When the United Arab Emirates businesses showed the world what swift COVID-response action looked like and took to the cloud in droves, they experienced...
Understanding-And-Preventing-The-Log4j-Exploit-And-Botnets

Understanding And Preventing The Log4j Exploit And Botnets

Of all the security issues that have appeared over the last few years, none has had the impact of the Log4j exploit. Also called the...
Fundamentals-Of-Cloud-Visibility-For-The-Modern-Digital-Enterprise

Fundamentals Of Cloud Visibility For The Modern Digital Enterprise

Cloud adoption in the Middle East, which was once restricted by data residency and security concerns, has recently seen a dramatic surge. As the region’s...
With-Cybersecurity-Strategies-'In-the-Doldrums',-Automation-Is-Your-Best-Ally

With Cybersecurity Strategies ‘In the Doldrums’, Automation Is Your Best Ally

Stories about data breaches have been appearing increasingly since the pandemic, and some people could think it's just a hyperbole driven by the media....
Aruba-Leads-The-Way-On-Wi-Fi-6E-Standard-Power

Aruba Leads The Way On Wi-Fi 6E Standard Power

A Groundbreaking Wi-Fi 6E Demonstration History was made in Riyadh, Saudi Arabia on August 3, with the world’s first public demonstration of Wi-Fi 6E Access Points...

Latest Posts