Blogs
2022: A cybersecurity odyssey
F5 Labs (and friends) 2022 will be eye-catching year for cybersecurity incidents, fallouts, and innovations. To make sense of it all, F5 ...The new security demands of our hybrid working future
Ram Narayanan, Country Manager, Check Point Software Technologies, Middle East, elaborates on the new security demands. For technology leaders around the world, ...Moving beyond zero trust – a practical approach to proliferating ransomware
Gregg Petersen, Regional Director – MEA at Cohesity elaborates on how Zero Trust is now no longer sufficient, but rather organisations need ...5 reasons why you need zero trust architecture
Amr Alashaal, Regional Vice President – Middle East at A10 Networks elaborates on the need to adapt zero trust architecture. In the ...The Recency Bias: why over-rotating on cybersecurity is leaving gaps in disaster recovery plans
Rick Vanover, Senior Director, Product Strategy, Veeam Software and Dave Russell, Vice President, Enterprise Strategy at Veeam Software elaborates on why it ...Anatomy of a DDoS attack: extortion and mitigation
Ali Sleiman, Technical Director MEA at Infoblox provides readers with an understanding of DDoS attacks and provides tips on how to mitigate ...SD-WAN: The Bridge to a 5G future
Jacob Chacko, Regional Director – Middle East, Saudi & South Africa at Aruba, a Hewlett Packard Enterprise company, elaborates on the potential ...How multi-cloud application delivery is impacting ecommerce providers as they prepare for major growth
Adrian Taylor, VP of EMEA at A10 Networks elaborates on how multi cloud application delivery is impacting e-commerce providers. Ecommerce continues to ...Assume compromise: new security fundamentals for the new threat era
In this exclusive opinion piece, Ammar Enaya, regional director – METNA, Vectra AI, discusses the importance of advanced threat detection & response. ...The definition and examples of Exploit Kits
Aamir Lakhani, Global Security strategist and researcher at Fortinet, elaborates on various kinds of exploit kits. In cybersecurity terminology, an exploit is ...



















