data

Stay ahead of the curve with real-time updates, expert insights, and breaking news from the global security industry. At Security Buyer, we bring you in-depth coverage on the latest trends, innovations, and developments shaping the world of physical, cyber, and operational security.

Check back regularly for the latest updates, and be sure to become a Security Buyer member to get access to our newsletters, videos and latest issues giving you  direct access to top security stories as they happen.

AppsFlyer

AppsFlyer Collaborates with AWS

AppsFlyer has announced the expansion of its AppsFlyer Data Collaboration Platform (DCP) offering for brands and commerce…
NHS

Are your medical records safe?

Cyberattacks on healthcare demand robust data management, secure disposal practices, and collaborative cybersecurity measures…
BeyondTrust

BeyondTrust solidifies leadership position

BeyondTrust, the leader in intelligent identity and access security, has announced significant recurring growth in 2023…
Hacker

Cybersecurity CEO blasts Microsoft for email breach

Microsoft executives had their emails hacked, with the company saying the attack was carried out by a Russian intelligence group…
Southco

Improving Medical Equipment Security

The increasing mobility of equipment in the medical environment raises new cause for concern, especially when managing access to valuable…
Antoine Harb_Team Leader Middle East_Kingston Technology. (1)

Healthcare entities and employees ‘must overcome cybercrime’

Boasting world-class data protection capabilities has never been more essential for companies across industries. While tremendous…
Veeam

Mediclinic Middle East Partners with Veeam

Veeam Software announced it was selected by Mediclinic Middle East to modernize its business-continuity facilities and enhance…
Microsoft

G42 and Microsoft unlock new opportunities

G42 and Microsoft have embarked on the next phase of their ongoing strategic collaboration and announced a multifaceted…

Android device migration

The exchange of smartphones has a significant complication in transferring data to the new device. To overcome this problem, Cloning applications were introduced to overcome this problem, which will clone the entire device to the new one…
data

On the edge of vulnerability

Security Buyer sits down with industry experts to determine the best approach for organisations to secure their data storage…
Scroll to Top