Selected-Features

Rudie Opperman, Engineering and Training Manager EMEA at Axis Communications explores how thermal imaging technology is being used to protect electrical substations. Like any critical infrastructure, electrical substations face several risks. These include intruders, vandals, hazardous weather conditions, and peak energy demand periods. On top of...

As cyber threats becomes an epicentre of GCC business risk, James Gerber, CFO of SimSpace, details the preventative measures large organisations should be taking to ensure bottom-line growth in 2024. In early 2023, the GCC Executive Committee for Cybersecurity held its first meeting, marking a political...

When it comes to protecting critical infrastructure, biometric technology is the route to go, says Shiraz Kapadia, CEO and President of Invixium. Strategies for safeguarding critical infrastructure at a national level are a fundamental necessity for the governments of countries everywhere placing significant importance on securing...

Data is central to corporate daily operations, and leaders must be knowledgeable in the intricacies of data privacy and protection. As the digital landscape continues to evolve, it is transforming the way organizations, industries, societies, and individuals operate and interact with each other. In the first part...

Matrix Security Solutions was able to assist a cash management solutions company in Riyadh in overhauling its systems for more efficient operations. Company Overview A cash management solutions company based in Riyadh, that provides customised cash solutions to banks, CITS and corporates. The company manages end-to-end receivables...

Matthew Hunt, Head of Sales (Land Communications), Thales UK, looks at Cyber and Electro Magnetic Activities (CEMA) and its role on the battlefield. Ask anyone for the first words that spring to mind at the mention of ‘cyberspace’ and they will likely say some variety of:...

Explore how an AI-powered security solution strengthens airport safety and security and enhances passenger’s experience. After the post-COVID slump, the aviation industry is now experiencing a robust recovery. But as passenger traffic increases, so do security challenges for airports. To protect their assets and safeguard staff...

Sandy Issa, Marketing Manager, Intelligent Security Systems (ISS) for the Middle East, is the only woman on a team of 25. She talks to Security Middle East magazine about how she navigates the gender divide in a tech-orientated sector. What it is like to be a...

We learn more about March Networks and its innovative and proven video surveillance and business intelligence capabilities from Trevor Sinden, March Networks’ Director of Middle East Sales. March Networks helps enterprises of every size improve their security and competitive advantage with the world’s most innovative solutions...

Mobile credentialing enables freight forwarders to reduce costs while increasing supply chain transparency. By Richard Moser and Carl Fenger, LEGIC Identsystems. Continuous technological advancements are reshaping the logistics market. Complex logistic and security challenges can now be solved based on mobile credentialing technology resulting in reduced...

Security Middle East had the opportunity to sit down with CEO of cyber-risk prevention firm KATIM, Didier Pagnoux. KATIM is the sole provider integrating sovereign classic and post-quantum cryptography, developed in UAE’s designated National Crypto Centers in our products. Based in Abu Dhabi and having...

Colonel Feras Mohammad Abdulla Belhasa Alshamsi, Director of Central Operations Department, Dubai Civil Defense, spoke to Security Middle East magazine about its recent deployment of the Everbridge SAGA Incident Response System. Can you tell us about your involvement in the SAGA Incident Response System project? As the Project Owner,...

Intelligent security systems – ISS has managed to rapidly establish itself as a leading provider of advanced security technologies in Saudi Arabia. We find out the back story and the reasons for their success. Saudi Arabia has become the prime target market for a host of...

Are you prepared for managing multiple identities in the cloud? Morey Haber, chief security officer, BeyondTrust, looks at how to stay safe in the cloud. For many Middle Eastern enterprises, the cloud is the new neighbourhood for business, commerce and socialisation. Advertised as up-and-coming, it has...

According to Rick Vanover, senior director, of product strategy, Veeam, ransomware is indiscriminatory and organisations must be prepared for the fallout. Ransomware attacks continue to grow in frequency. As well as being more common, ransomware is also getting more potent. According to Veeam’s 2023 ransomware trends...

V. Hrytsevich, CEO, of 3dEYE Inc., explores the challenges faced by organisations with traditional on-premise or hardware-based video surveillance approaches and how Pure Cloud Video Surveillance as a-Service (VSaaS) architecture could address these challenges. Cloud computing has become a vital foundation for digital innovation, and Software-as-a-Service...

Dan Norman, Regional Director, EMEA, ISF, explores how organisations in the Middle East can securely and confidently deploy cloud services. Cloud computing has evolved at an incredible speed and, for many organisations globally, has already become entwined with the complex technological landscape that supports critical daily...

Emad Fahmy, Systems Engineering Manager, Middle East, NETSCOUT, looks at why botnets are one of the more dangerous threats to ISPs and enterprises In the ever-evolving landscape of cybersecurity threats, distributed denial-of-service (DDoS) attacks have proven to be a persistent and potent menace. Among the various...

Jamie Collier, senior threat intelligence advisor at Mandiant looks at how cyber threat intelligence teams can be empowered with a requirements-driven approach. The ever-evolving landscape of cyber threats poses significant challenges to organisations worldwide. As threat actors continue to become more sophisticated, it is important for...

A significant part of a smart city’s budget is taken up by security costs. Dr Ryad Soobhany, Associate Professor in the School of Mathematical and Computer Sciences, Heriot-Watt University Dubai, looks at the security risks of smart cities. According to analysis from Frost & Sullivan, technology spending related to...

With almost 88% of data breaches being caused by an employee mistake, a strong human risk management programme with regular employee training and cybersecurity awareness is critical, says Carey van Vlaanderen, CEO of ESET Southern Africa. Ask any cybersecurity specialist about their biggest network safety concern,...

Fears have arisen around artificial intelligence since the coming of the year 2000. With Y2k set to the be apocalypse, and the machines going to overrun us. In a previous article, we looked at how artificial intelligence may one day begin iterating upon itself faster than...