Selected-Features

Colonel Feras Mohammad Abdulla Belhasa Alshamsi, Director of Central Operations Department, Dubai Civil Defense, spoke to Security Middle East magazine about its recent deployment of the Everbridge SAGA Incident Response System. Can you tell us about your involvement in the SAGA Incident Response System project? As the Project Owner,...

Intelligent security systems – ISS has managed to rapidly establish itself as a leading provider of advanced security technologies in Saudi Arabia. We find out the back story and the reasons for their success. Saudi Arabia has become the prime target market for a host of...

Are you prepared for managing multiple identities in the cloud? Morey Haber, chief security officer, BeyondTrust, looks at how to stay safe in the cloud. For many Middle Eastern enterprises, the cloud is the new neighbourhood for business, commerce and socialisation. Advertised as up-and-coming, it has...

According to Rick Vanover, senior director, of product strategy, Veeam, ransomware is indiscriminatory and organisations must be prepared for the fallout. Ransomware attacks continue to grow in frequency. As well as being more common, ransomware is also getting more potent. According to Veeam’s 2023 ransomware trends...

V. Hrytsevich, CEO, of 3dEYE Inc., explores the challenges faced by organisations with traditional on-premise or hardware-based video surveillance approaches and how Pure Cloud Video Surveillance as a-Service (VSaaS) architecture could address these challenges. Cloud computing has become a vital foundation for digital innovation, and Software-as-a-Service...

Dan Norman, Regional Director, EMEA, ISF, explores how organisations in the Middle East can securely and confidently deploy cloud services. Cloud computing has evolved at an incredible speed and, for many organisations globally, has already become entwined with the complex technological landscape that supports critical daily...

Emad Fahmy, Systems Engineering Manager, Middle East, NETSCOUT, looks at why botnets are one of the more dangerous threats to ISPs and enterprises In the ever-evolving landscape of cybersecurity threats, distributed denial-of-service (DDoS) attacks have proven to be a persistent and potent menace. Among the various...

Jamie Collier, senior threat intelligence advisor at Mandiant looks at how cyber threat intelligence teams can be empowered with a requirements-driven approach. The ever-evolving landscape of cyber threats poses significant challenges to organisations worldwide. As threat actors continue to become more sophisticated, it is important for...

A significant part of a smart city’s budget is taken up by security costs. Dr Ryad Soobhany, Associate Professor in the School of Mathematical and Computer Sciences, Heriot-Watt University Dubai, looks at the security risks of smart cities. According to analysis from Frost & Sullivan, technology spending related to...

With almost 88% of data breaches being caused by an employee mistake, a strong human risk management programme with regular employee training and cybersecurity awareness is critical, says Carey van Vlaanderen, CEO of ESET Southern Africa. Ask any cybersecurity specialist about their biggest network safety concern,...

Fears have arisen around artificial intelligence since the coming of the year 2000. With Y2k set to the be apocalypse, and the machines going to overrun us. In a previous article, we looked at how artificial intelligence may one day begin iterating upon itself faster than...

Gaurav Saxena, Chief Strategist & Director of Business Transformation at Insprago Digital Solutions and SPA member looks at why cybersecurity is not just a concern for corporations. The security space has witnessed a drastic transformation over the past three decades, whether it is the type of...

Kim Rahfaldt, Director of Marketing and Public Relations at AMAG Technology, looks at why physical security must be involved in the cyber conversation at every level. Securing cyber assets is more than trying to stop people from hacking into a network; organisations must also watch and...

As cyber-attacks soar, here's how businesses can curtail the cost of data breaches according to Toni el Inati rvp sales, meta & cee of Barracuda networks. As the middle east makes a concerted effort to grow its knowledge and skills-based economy, the role of data in...

Ashley Beck, Senior Industry Consultant – Global, Fraud & Security Intelligence Division at SAS, looks at how unethical AI challenges within policing can help to empower more equitable societies. Decision-making processes within policing incidents and investigations have many elements which are fed by information at each...

As technology advances, physical security systems are becoming increasingly important due to the rising threats, technological advancement, regulatory compliance, and the need for remote monitoring, says SPA member, Arif Almalik, Chief Digital Products Officer, Moro Hub. The protection of personnel, hardware, so ware, networks and data...

This issue Meshal Aljohani, CPP, PSP, PCI, Security Group Supervisor at Aramco, spoke to Abdullah Alshehri, CPP, PSP, PCI, Security Duty Manager at King Abdullah University of Science and Technology (KAUST), Saudi Arabia. Describe your experience in the security industry? Coming from a military background, in 2009...

Cyber threats are increasing at a rate far greater than the industry is able to cope with. Despite this, C-suite executives still don’t take cybersecurity seriously enough while boards are not nearly as engaged in cybersecurity as they are in other areas of oversight, says...

Abhay Pandey, Founder and CEO, MAST Consulting, looks at integrating security tools with a cybersecurity mesh. In the developing world, people perceive digitalisation as a synonym for opportunities and possibilities. So, forward-thinking nations such as the UAE are receptive to disruptive technologies and innovations. However, the promise...

High value applications for AI video analytics are emerging at an increasing rate, and are not limited to security alone, writes Dennis Choi, General Manager, IDIS Middle East & Africa. Video analytics, powered by AI, have been transforming security operations with ever more reliable tools for...

Michel Roig, President of Payment & Access at Fingerprint Cards, takes a look at some of the trends, developments and players responsible for making 2022 a big year for biometrics and ensuring the foundations are in place for a transformative 2023. Biometrics have well and truly...

Our panel discussions will cover three key topics which we believe to be critical to the industry right now: addressing Saudi Arabia’s talent gap within the security sector; securing Saudi Vision 2030; and resiliency in the age of digitisation. Securing Saudi Vision 2030 The over-arching aim for...

Khalid Saad Al Medbel, General Director, Information Security, Ministry of Health, takes a closer look at how cybersecurity capabilities can be strengthened with a holistic strategy that puts people at its heart. With security threats becoming ever-more sophisticated and frequent, organisations in the Middle East need...

More and more businesses are implementing multi-factor authenticity through the use of advanced biometrics technology.  Face authentication ensures the highest security standards with maximum convenience. Businesses are beginning to offer hybrid and remote work following the major adjustment to workflows during the COVID-19 pandemic. However, with...

Stephen Allen, Senior Product Manager for HID IAMS' Authentication portfolio, looks at Fast Identity Online (FIDO), a form of cryptographic passwordless authentication. How can we be sure that people are who they say they are? The search for a secure, scalable and convenient way to authenticate...

Peter O’Connell, Chair of The Security Institute Mid-East Members Group, looks at how the ethos of ‘people drive results’ can be translated to address security challenges. As Chair of the Security Institute Mid-East Members Group (MEMG) I am honoured to hold such a position and proud...

Hear from key organisations who filmed with Security Middle East Magazine live from Intersec. For the first time ever in the show’s history, Security Middle East magazine took along a camera crew to film short clips with some of the event’s exhibitors. Short interviews and product...

All eyes were on Dubai in January, as the 24th edition of the annual Intersec exhibition opened its doors to the security industry. With the aim of advancing the security landscape, more than 800 exhibitors from 55 countries packed out the halls of the Dubai World...

The experts at Kaspersky have compiled a cheat sheet for escaping crypto-mining attacks. Like company stocks, cryptocurrency too is a volatile market. It has its boom-and-bust phase from time to time. But what doesn’t have a bust phase is cyberattacks. Although the value of cryptocurrencies nosedived...

Most organisations will agree that the more video coverage, the better! Fadhl Al-Bayaty, Vice President of Product Management at VuWall, looks at the design challenges of control rooms and what it takes to overcome them to improve efficiency. The security landscape around visualisation has changed so...

Mr. Tanzil Mahmood, Security Professionals Association (SPA) member and Director at Human Integration Middle East, looks at what the ‘Control Room as a Service’ model offer to the security market and who needs it Control rooms are designed to ensure maximum compliance with security, safety or operational...