Author: Mike Dingle

With millions of transactions taking place every day around the Middle East, armoured vehicles are utilized to move mass amounts of money from one place to another, in this article, we take a look at what goes into an armoured vehicle, including its various mechanisms...

Top CISOs from Uber, Zoom, Snap Inc, Huawei, Netflix, and others confirmed for the Executive Summit, while the three-day event will also host the launch of the Black Hat MEA 966 Chapter. Black Hat Middle East & Africa (MEA), the cyber industry’s fastest-growing event, is on...

Ending a seven-year diplomatic rift, the ambassador from Iran is expected to arrive in Riyadh in the coming days. In June of this year, the Iranian embassy was re-opened in Saudi Arabia, following its closure seven years ago. Iran's new envoy to the Kingdom of Saudi Arabia,...

Financial Technology and Banking Security in Saudi Arabia continue to boom, due to the continued development of several innovative projects as part of the Saudi Arabia Vision 2030. Data Centres are being founded across the Middle East. Allowing for deeper customer interactions and transaction analysis -...

Biometric security has been implemented in malls across Kuwait, as part of an effort from the Ministry of the Interior to enhance nationwide security. The Avenues Mall was the first to have a biometric station set up. Instead of a time-consuming process at an official office,...

Jon Hill, Account Executive, Transport & Public Safety at Genetec looks at how we should be taking a proactive approach to safeguarding both cyber and physical security for transport. The transport industry has a difficult history of cyberattacks. When NotPetya was unleashed in 2017, the malicious...

Cybersecurity comes as one interconnected package, stopping breaches, analysing malware and reinforcing servers and workflow along the way. However, physical security stands as a more modular design, to meet the various needs of an establishment. One may have fences, another may have gates. One business...

RecFaces, an international developer of biometric software solutions with facial recognition functions, announces its participation in the international conference Innovation Airport Summit, which will be held in Riyadh, Saudi Arabia on September 4 and 5. The company will be represented by Mohammed Bajarsh, Head of...

HID, the world's leading provider of trusted identity solutions, recently announced it now offers companies the integration of employee badges into digital wallets, allowing for convenient, seamless access to the workplace. The integration will allow employees to easily access all parts of an establishment, through the...

As part of the ongoing technological revolution happening within the Middle East, as part of a number of digital initiatives, Blockchain Technology has begun gaining significant developmental traction. Blockchain Technology is a decentralized, transparent form of transaction that is applicable to various industries. Finance, Healthcare, Supply Chain...

Dan Norman, Regional Director, EMEA, ISF, explores how organisations in the Middle East can securely and confidently deploy cloud services. Cloud computing has evolved at an incredible speed and, for many organisations globally, has already become entwined with the complex technological landscape that supports critical daily...

Emad Fahmy, Systems Engineering Manager, Middle East, NETSCOUT, looks at why botnets are one of the more dangerous threats to ISPs and enterprises In the ever-evolving landscape of cybersecurity threats, distributed denial-of-service (DDoS) attacks have proven to be a persistent and potent menace. Among the various...

In market news, Amiviz, the pioneering B2B cybersecurity enterprise marketplace has seen impressive growth across critical metrics in the recent months. The company have suggested the cause of the growth is due to their dedication to delivering exceptional services, whilst placing strong value on their user...

Following the success of Blackhat USA, Cybersecurity company Delinea carried out an extensive survey to understand the momentum of the IT security industry. The survey polled 100 industry professionals. Of these 100, 54% said that “passwordless” is a viable concept while 79% agreed that passwords are...

Jamie Collier, senior threat intelligence advisor at Mandiant looks at how cyber threat intelligence teams can be empowered with a requirements-driven approach. The ever-evolving landscape of cyber threats poses significant challenges to organisations worldwide. As threat actors continue to become more sophisticated, it is important for...

Bahrain’s Interior Ministry has recently revealed the six types of cybercrimes that pose the most danger to the country’s society and economy in a bid to raise more awareness of digital crimes. They were: child sexual exploitation, online stalking, viruses, bank card fraud, hacking and digital...

A significant part of a smart city’s budget is taken up by security costs. Dr Ryad Soobhany, Associate Professor in the School of Mathematical and Computer Sciences, Heriot-Watt University Dubai, looks at the security risks of smart cities. According to analysis from Frost & Sullivan, technology spending related to...

ChatGPT is taking the world by storm with its widespread capabilities and its applicability in a number of fields. Schools across the UK, the US and the Middle East are looking at ways of restricting Chat-GPT's usage in homework and work assignments, due to the generative...

Smishing is an uncommon word, but makes perfect sense when broken down into its two components - SMS Phishing. As the name implies, these are text messages which have a seemingly innocent request on them, informing you of an upcoming payment, missed payment or interruption in...

AlJammaz Technologies has been onboarded as the newest distribution partner for Axis Communications in the Kingdom of Saudi Arabia. The new collaboration will unite the innovative surveillance technology Axis Communications is known for, with AlJammaz Technologies’ excellence in Value Added distribution and channel network development. The...

Darktrace's innovative cybersecurity solutions continue to evolve, with the introduction of HEAL. The three parts of Darktrace's AI Loop which were fully operational, PREVENT, DETECT and RESPOND have already been covered in previous articles at Security Middle East, however, a quick breakdown of their functionality can...

With almost 88% of data breaches being caused by an employee mistake, a strong human risk management programme with regular employee training and cybersecurity awareness is critical, says Carey van Vlaanderen, CEO of ESET Southern Africa. Ask any cybersecurity specialist about their biggest network safety concern,...

There are many exhibitions and showcases that make up the world of Security and Fire, Intersec 2023 seeks to stand out, through its use of innovation, scale, venue and methodology, elevating it above ‘just another exhibition’. Zones Intersec 2023 will be split into various zones, allowing visitors...

Fears have arisen around artificial intelligence since the coming of the year 2000. With Y2k set to the be apocalypse, and the machines going to overrun us. In a previous article, we looked at how artificial intelligence may one day begin iterating upon itself faster than...

In our most recent Cybersecurity Decision Maker survey, we asked more than 600 organizations about the security issues that they have faced in the last 12 months. Over two-thirds of survey respondents declared they had experienced issues ranging from numerous ‘limited security issues’ to multiple...

In the dynamic landscapes of technologically innovative societies, we have evolved into internet citizens and digital consumers. Consequently, the protection of our digital identities has become a critical imperative in today's interconnected world. As technological advancement and operations rely increasingly on robust security measures, the...

Unique technologies such as thermal cameras and artificial intelligence are game-changers in the fast-moving internet security economy - helping to secure the backbone of the digital economy, Data Centers. Thermal Cameras and Temperature Vulnerabilities Thermal cameras use infrared radiation to capture images, even in complete darkness or...

With Covid-19 coming to an end, the world is beginning to open its borders again, however, this means that innovations must return to the transport security industry. SecuScan, a company who have worked with Security Middle East in the past, has developed The SecuScan Under Vehicle...

Shoplifting incidents continue to rise, forcing retailers to turn to facial biometrics as a security measure. The increase in retail attacks, as well as a growing level of aggression from organized groups, is prompting widespread concern. The 2021 "Retail Security Survey: The State of National Retail Security...

Viisights, Inc., a global leader in behavioral recognition video analytics, announced today the release of Wise 3.0, ushering in the next generation of proactive analytics for professional security. Wise 3.0 provides significant improvements in processing speeds and performance impact, specifically in high recall and low false...

Jeff Burgess, Chief Executive Officer and BCD Founder Jeff Burgess has officially announced his retirement following his 66th birthday - after 44 years of working at the IT company. Burgess began his computer career back in 1979 after landing a warehouse job at Tek-Aids Industries, an...

83% of successful cyberattacks in the Middle East had a targeted nature, according to a new report by Positive Technologies. According to Positive Technologies’ cybersecurity threatscape report, Middle Eastern government entities are especially appealing targets to cybercriminals: 22% of total attacks on organizations targeted government agencies,...

ManageEngine, the enterprise IT management division of Zoho Corporation, today announced that it has newly added OpenAI observability as a native capability to Site24x7, its comprehensive cloud-based observability platform. The offering enables application owners to monitor different OpenAI models seamlessly while tracking real-time performance and cost...