Cybersecurity

Harish-Chib,-Vice-President,-Middle-East-&-Africa,-Sophos

Sophos to showcase its latest cybersecurity innovations at GITEX Technology Week 2019

Company to demonstrate how its cloud security and EDR solutions help organisations of all sizes battle emerging threat landscape
allegion

Cloud-based Access Control: Improving Security in More Ways Than One

Traditionally, access control systems have come in the form of conventional lock and key methods, electronic systems or a combination of the two
Huawei

Chinese tech giant allowed by help build 5G network in the UK

Decision set to anger both national and international politicians plus partners in the Five Eyes security cooperation group

IDIS to showcase latest cybersecurity, deep learning and camera innovations at ISC West 2019

IDIS will celebrate five years at ISC West International Security Exhibition in Las Vegas, April 10-12th in booth #18059.

UK threat report from Carbon Black finds 88% of UK businesses have been breached during the last year

Carbon Black has released the results of its second UK Threat Report – the research indicates that the UK’s cyber threat environment is intensifying.

Cybersecurity and compliance in an uncertain climate

Data Protection Day marked the start of a challenging year for businesses as the opportunity for cyber attack increases dramatically.

Cyber security scorecard gives business real-time understanding of security risks

Huntsman Security has launched The Security Scorecard – the first tool of its kind to give instant visibility of an organisation’s Cyber Security Posture.
A10 Networks

The state of DDoS Weapons – Q4 2018 – Special report by A10 Security research

A10 Network’s recently released State of DDoS Weapons Report provides unique insights into Distributed Denial of Service (DDoS) attack techniques.

The state of DDoS Weapons – Q4 2018 – Special report by A10 Security research

A10 Network’s recently released State of DDoS Weapons Report provides unique insights into Distributed Denial of Service (DDoS) attack techniques.
Scroll to Top