Security | News, how-tos, features, reviews, and videos
The Middle East, which has been embroiled in geopolitical conflicts for decades, is witnessing a rising number of cyberattacks as age-old geopolitical rivalries move into the digital realm and remote work opens up new targets for attackers.
Next-horizon technologies have piqued some IT leadersu2019 interest in terms of the business value they may ultimately drive. Others remain skeptical of the high-risk payoff.
The Middle East, which until recently has had relatively little experience with remote work, has been vulnerable to ransomware. Though the number of tech leaders who say they've been hit with ransomware has declined lately, that may just mean
Many Middle East tech leaders are moving to the cloud for the first time. Here are practical tips for making cloud security work for you: common problems to avoid, the need for in-house skills, why identity management is key, and smart use of threat
Broadcom is committed to helping organizations and governments meet their digital transformation and data-sovereignty needs
In the wake of the explosions at Iran's Natanz nuclear facility, widely attributed to Israel, a retaliation is likely to take the form of a cyberattack, security experts say.
To harden Israelu2019s water network against an estimated 500,000 hacking attempts a year, Mekorot, the nation's water supplier, has invested heavily in securing critical infrastructure.
New, cross-discipline risk management techniques are necessary to securely reap the benefits of transformative technologies.
Middle East governments are dipping their toes into confidential computing as a way of ensuring compliance with data regulations and information security in cloud settings. Here's a look at what it is and how it can help your business.
Things will never be the same. Hereu2019s a look at what IT will look like as the COVID-19 threat recedes.
Israel is a crucible for cloud security startups aiming to solve enterprise security issues for open source, serverless, container and virtual computing technology.
Sponsored Links