Cyber Security

CYFIRMA Industry Report finds numerous attack campaigns launched on businesses. Logistics are an essential component in Middle Eastern exports and imports, manufacturing, and business operations. But what happens when cyber criminals target the industry? The CYFIRMA report found that logistics firms are battling against the rising wave of...

AccessData recently signed ARM, as its Middle East and Africa (MEA) distribution partner. According to their partnership, ARM will be responsible for business development, and market expansion and assist AccessData in building the channel partner community in the region through a partner recruitment drive. Simon Whitburn, Senior...

Infoblox Inc. unveiled an industry-first, AI-driven security operations solution, SOC Insights. This solution boosts its DNS Detection and Response solution, BloxOne® Threat Defense. SOC Insights bolsters security analysts to jump-start investigations and dramatically reduce response time by turning vast amounts of security events, network, ecosystem, and unique...

VAST Data announced its partnership with Run: ai, the leader in computing orchestration for AI workloads. The collaboration between both companies hopes to redefine AI operations at scale, offering a full-stack solution encompassing computing, storage, and data management. VAST and Run:ai will be addressing the critical needs...

As cyber threats becomes an epicentre of GCC business risk, James Gerber, CFO of SimSpace, details the preventative measures large organisations should be taking to ensure bottom-line growth in 2024. In early 2023, the GCC Executive Committee for Cybersecurity held its first meeting, marking a political...

Stc Bahrain received dual recognition at the Global Economics Awards ceremony due to their ongoing commitment to excellence and innovation in the region. After years of advancing the Kingdom's ICT sector with cutting-edge technological solutions, the company was awarded Best Network Security Solutions Provider and Best...

AmiViz, the Middle East region’s first enterprise B2B marketplace for cybersecurity has announced a strategic partnership with Asimily, who deal with a comprehensive Internet of Things (IoT) and Internet of Medical Things (IoMT) risk management platform. The full press release details the partnership: This alliance underscores the...

Qatar's National Cyber Security Agency (NCSA) is set to expand the Educational Cybersecurity Curricula to private schools in the region this year. During the course of 2023, the NCSA, implemented the curricula to all government schools in the region. This was based upon the agency's desire...

According to The Cyber Express, Bahrain’s E Visa service has been targeted by notorious hacktivists, Anonymous Collective. As yet, details on the extent of the breach, what information has been compromised and the motive, have not been disclosed. The cyber attack has not yet been verified...

Gulf Business Machines (GBM), an end-to-end digital solutions provider and Siemens, a leader in technological solutions, have announced a collaborative effort to support more industries within the GCC to hone their competitive edge while supporting their sustainability ambitions. The collaboration was signed at the COP28, currently...

Cloudlfare Inc continues in its goal to build a better digital landscape through its 2023 Q3 DDoS report, which features a number of insights and trends regarding the DDoS threat landscape - as observed through the global Cloudflare network. The Cloudflare network is one of the...

The Saudi Vision 2030 initiative pushes businesses of all natures to advance their technologies, elevating the quality of life for those within the Kingdom. Part of this includes the expansion and streamlining of Saudi Arabia's cloud data services - which has already been seen through...

As Data Centres continue to revolutionize the way business is done in the Middle East, companies are facing an inevitable question - how will we encrypt our data? In the following article, we break down what goes into that decision,  which encryption keys prove effective and...

According to Rick Vanover, senior director, of product strategy, Veeam, ransomware is indiscriminatory and organisations must be prepared for the fallout. Ransomware attacks continue to grow in frequency. As well as being more common, ransomware is also getting more potent. According to Veeam’s 2023 ransomware trends...

Ingram Micro today announced a distribution agreement with Okta, a leader in cybersecurity solutions to cover Bahrain, Kuwait, Iraq, Oman, Qatar, Saudi Arabia, the United Arab Emirates, and Egypt. This collaboration enables Ingram Micro to expand its security solutions portfolio for resellers and managed service providers...

Emad Fahmy, Systems Engineering Manager, Middle East, NETSCOUT, looks at why botnets are one of the more dangerous threats to ISPs and enterprises In the ever-evolving landscape of cybersecurity threats, distributed denial-of-service (DDoS) attacks have proven to be a persistent and potent menace. Among the various...

Following the success of Blackhat USA, Cybersecurity company Delinea carried out an extensive survey to understand the momentum of the IT security industry. The survey polled 100 industry professionals. Of these 100, 54% said that “passwordless” is a viable concept while 79% agreed that passwords are...

Jamie Collier, senior threat intelligence advisor at Mandiant looks at how cyber threat intelligence teams can be empowered with a requirements-driven approach. The ever-evolving landscape of cyber threats poses significant challenges to organisations worldwide. As threat actors continue to become more sophisticated, it is important for...

Bahrain’s Interior Ministry has recently revealed the six types of cybercrimes that pose the most danger to the country’s society and economy in a bid to raise more awareness of digital crimes. They were: child sexual exploitation, online stalking, viruses, bank card fraud, hacking and digital...

Smishing is an uncommon word, but makes perfect sense when broken down into its two components - SMS Phishing. As the name implies, these are text messages which have a seemingly innocent request on them, informing you of an upcoming payment, missed payment or interruption in...

Darktrace's innovative cybersecurity solutions continue to evolve, with the introduction of HEAL. The three parts of Darktrace's AI Loop which were fully operational, PREVENT, DETECT and RESPOND have already been covered in previous articles at Security Middle East, however, a quick breakdown of their functionality can...

In the dynamic landscapes of technologically innovative societies, we have evolved into internet citizens and digital consumers. Consequently, the protection of our digital identities has become a critical imperative in today's interconnected world. As technological advancement and operations rely increasingly on robust security measures, the...