VELOCITY - DATA AND ANALYTICS SUMMIT

Data

High-Risk Cyber Vulnerabilities Trends: Where's the Future?

High-Risk Cyber Vulnerabilities Trends: Where’s the Future?

According to research by Qualys, one-third of the high-risk vulnerabilities impact network devices and web applications that are traditionally difficult to safeguard through conventional...
How do Phishing Scammers Lure Victims with Fake Giveaways?

How do Phishing Scammers Lure Victims with Fake Giveaways?

According to a phishing incident reported in Singapore, scammers created a sophisticated site that prompted users to enter their Telegram details, mimicking Singapore’s Ministry’s...
Cybersecurity Trends in 2024

Cybersecurity Trends in 2024

Seventy-five per cent of the data generation and processing will happen outside the traditional confines of data centres or the cloud, inviting cyber vulnerabilities...
Is It Time to Ring the Cyber Bell?

Is It Time to Ring the Cyber Bell?

From ChatGPT leaks to ransomware attacks, we explore the biggest data breaches from across the region. Vulnerabilities in data and overall cybersecurity are escalating concerns...
Will Ignoring Data Privacy and Security Compliances Risk Brand Reputation?

Will Ignoring Data Privacy and Security Compliances Risk Brand Reputation?

Seventy-three per cent of consumers are more concerned about their data security and privacy than just a few years ago, a survey revealed.  Compliance frameworks...
Top 25 Tech Moments of 2023 That Grabbed Attention

Top 25 Tech Moments of 2023 That Grabbed Attention

Tech news about inventions and discoveries around Open AI, GPT-4 and generative AI continued to grab headlines all year.  This year witnessed inspiring innovations, ranging...
Delving Into the Dangers of Cloud Security Denial

Delving Into the Dangers of Cloud Security Denial

Navigate the complex terrain of cybersecurity in the Middle East with insights into the challenges faced by security teams in hybrid and multi-cloud environments. “What...
Six Tips to Protect Your Organization from Holiday Scams

Six Tips to Protect Your Organisation from Holiday Scams

How to educate employees, schedule phishing training, and implement additional layers of security to defend your apps, APIs, and infrastructure from potential threats. Stay...
Is Sustainable Software Within Grasp for the UAE’s IT Sector?

Is Sustainable Software Within Grasp for the UAE’s IT Sector?

The UAE IT sector strives for sustainable software practices. Explores the role of software in reducing the ICT sector's environmental impact. Highlights the importance...
Black-Friday-Shopping-Deals-Leave-Security-Risks-for-Organisations-to-Deal-With

Black Friday: Shopping Deals Leave Security Risks for Organisations to Deal...

As Black Friday unfolds with enticing sales and special offers, it's crucial to recognise that cybercriminals are also capitalising on the chaos. This poses...

Latest Posts