Features

Ryad Soobhany, Associate Professor of Mathematical and Computer Sciences, Heriot-Watt University Dubai, unravels the use of camera technology in Middle East urban planning to enhance security. In the ever-changing landscape of the Middle East, where rapid urbanisation meets technological advancement, the integration of camera technology is...

John Hathaway, Regional Vice President, iMETA at BeyondTrust, says the path to cyber resilience is paved by privileged access management. IBM’s 2023 edition of its Cost of a Data Breach report puts the Middle East’s average data breach cost at US$8 million, which is almost double...

Passwordless implementation has long been heralded as the future, but are we ready, asks Mortada Ayad, Director, Sales Engineering at Delinea. We often hear about the increasing appetite for a passwordless future and while this mostly is in the context of consumers, the reasons for organisations...

Dan Norman takes us through the ISF’s last two-year forecast – made in 2022 – to determine how accurate they were, and the measures organisations may need to take. Every year the ISF provides a detailed, scenario-based, two-year threat forecast to its member organisations – a...

The future of technological advancements in the security landscape is a topic which most are interested in. However, it is always best to ask an expert. Vice President of Industrial Security Operations at Saudi Aramco, Sami Alajmi, reflects on his career and the state of...

Rudie Opperman, Engineering and Training Manager EMEA at Axis Communications explores how thermal imaging technology is being used to protect electrical substations. Like any critical infrastructure, electrical substations face several risks. These include intruders, vandals, hazardous weather conditions, and peak energy demand periods. On top of...

As cyber threats becomes an epicentre of GCC business risk, James Gerber, CFO of SimSpace, details the preventative measures large organisations should be taking to ensure bottom-line growth in 2024. In early 2023, the GCC Executive Committee for Cybersecurity held its first meeting, marking a political...

When it comes to protecting critical infrastructure, biometric technology is the route to go, says Shiraz Kapadia, CEO and President of Invixium. Strategies for safeguarding critical infrastructure at a national level are a fundamental necessity for the governments of countries everywhere placing significant importance on securing...

Matrix Security Solutions was able to assist a cash management solutions company in Riyadh in overhauling its systems for more efficient operations. Company Overview A cash management solutions company based in Riyadh, that provides customised cash solutions to banks, CITS and corporates. The company manages end-to-end receivables...

Matthew Hunt, Head of Sales (Land Communications), Thales UK, looks at Cyber and Electro Magnetic Activities (CEMA) and its role on the battlefield. Ask anyone for the first words that spring to mind at the mention of ‘cyberspace’ and they will likely say some variety of:...

Explore how an AI-powered security solution strengthens airport safety and security and enhances passenger’s experience. After the post-COVID slump, the aviation industry is now experiencing a robust recovery. But as passenger traffic increases, so do security challenges for airports. To protect their assets and safeguard staff...

Sandy Issa, Marketing Manager, Intelligent Security Systems (ISS) for the Middle East, is the only woman on a team of 25. She talks to Security Middle East magazine about how she navigates the gender divide in a tech-orientated sector. What it is like to be a...

We learn more about March Networks and its innovative and proven video surveillance and business intelligence capabilities from Trevor Sinden, March Networks’ Director of Middle East Sales. March Networks helps enterprises of every size improve their security and competitive advantage with the world’s most innovative solutions...

Managing the risks associated with machine learning (ML) and artificial intelligence (AI) is a multi-dimensional challenge, says Dan Norman, and as organisations become more dependent on them, securing them will become business critical. Over the last few years, artificial intelligence (AI) has received a tremendous amount...

Jonathan Mepsted, Vice President - Middle East & Africa at Netskope, looks at how organisations can enable genAI tools without compromising their overall security. We have entered a period of unprecedented technological growth. Artificial intelligence (AI), especially Generative AI (GenAI), has become a powerful force for...

TRASSIR is a CCTV systems manufacturer and video surveillance software developer which started in 2002 as a local company, has grown to become a global supplier, and now boasts a presence in over 42 countries. All of TRASSIR company’s advanced solutions are designed in-house. TRASSIR's...

Sajjad Arshad, Business Development Director, AxxonSoft Middle East, looks at the growing role of video surveillance in supporting retail security operations. In an ever-evolving retail landscape, the significance of security measures cannot be overstated. One of the most critical components of modern retail security is video...

Dennis Choi, General Manager, IDIS Middle East & Africa, explains how universities are turning to more capable and flexible video solutions. Just like any large institution, Middle East universities are susceptible to crimes including theft, vandalism and assault. Ensuring the safety of students, staff and property...

Perimeter protection is a crucial aspect of security, whether it be for public, residential or commercial purposes. Ara Ghazaryan, Ph.D, Technical Co-founder and VP of AI at Scylla, looks at how it can work even harder thanks to artificial intelligence (AI). Even in safe regions such...

Mobile credentialing enables freight forwarders to reduce costs while increasing supply chain transparency. By Richard Moser and Carl Fenger, LEGIC Identsystems. Continuous technological advancements are reshaping the logistics market. Complex logistic and security challenges can now be solved based on mobile credentialing technology resulting in reduced...

Those concerned about becoming a cybersecurity headline will do well to dwell on orchestration. Writing for our Cybersecurity Awareness Month coverage, Vibin Shaju, VP Solutions Engineering EMEA, Trellix, says it is the quickest route to a safer environment. The headlines are plentiful, as are their numbers...

James Gerber, CFO of SimSpace, unpacks why organisations should take a ‘train-to-failure’ approach to prepare for their worst day in cyber, for our Cybersecurity Awareness Month coverage. We are in an undeclared cyber war. Recent geopolitical unease has ushered in the first hybrid war, incorporating espionage,...

Traka Assa Abloy’s key management systems were installed to help Jubail O&M Company streamline its operational processes. THE CHALLENGES There are more than 230 staff operating at a single site, meaning the process of managing and controlling the facility’s critical keys to electrical switchgear, hazardous systems, vital...

Returning for its fifth year, Intersec Saudi Arabia is to take over the Riyadh International Convention and Exhibition Centre (RICEC) from the 3-5 October. This year, the show will have over double the space it had last year – with the event taking place over 15,000sq...

We’re kicking off Cybersecurity Awareness Month with a closer look at privileged access management, by John Hathaway, Regional Vice President, iMETA at BeyondTrust. IBM’s 2023 edition of its Cost of a Data Breach report puts the Middle East’s average at US$8 million, which is almost double...