Blogs
The value of threat intelligence continues to grow
Firas Ghanem, Regional Director – Middle East & Pakistan at ThreatQuotient discusses on how threat intelligence was a success 2,500 years ago and its ...Five tips for computer security day 2021
On the 33rd anniversary of Computer Security Day, Check Point Software Technologies provides five important reminders for protecting IT systems in the ...It’s time to bring in the cybersecurity experts
Cost savings and unparalleled expertise in the latest cybersecurity solutions and technologies are among several benefits that engaging an MSSP can deliver ...Why security teams cannot neglect privileged access management
Christopher Owen, CTO, NetGraph writes why with the right approach, PAM represents a crucial line of defence in its ability to stall ...OT leaders continue to face security challenges
Rick Peters, Operational Technology Global Enablement Director at Fortinet shares his thoughts on how security readiness was taxed by the COVID-19 crisis ...Top 10 Security Misperceptions
Peter Mackenzie, Manager of Sophos’ Rapid Response team shares insights into security misperceptions seen across organizations who have faced cyberattacks Below is ...Key investments driving the channel recovery
Sherifa Hady, EMEA Channel Sales Director at Aruba, a Hewlett Packard Enterprise company writes about how the channel needs to show a ...Democratizing IT to help accelerate digital transformation
Dinesh Varadharajan, Vice President – Kissflow writes that the rise of Low-code and no-code platforms offers Middle East organizations an efficient and ...XDR is a Movement
Marc Solomon, Chief Marketing Officer at ThreatQuotient writes about XDR and how he considers it as a movement because it is gaining ...5 next-gen cyber threats targeting your privacy
AI and automation technologies in the hands of cybercriminals and other malicious actors make privacy threats exponentially worse writes Shuman Ghosemajumder, Global Head ...



















