Features

  • Sherif Shaltout vice president operations, Cysiv Middle East & Africa addresses the key frustrations facing security operations operatives and how SOC-as-a-Service can help solve them  Enterprises are constantly adopting new tools and technologies to make threat detection and response more effic...

  • International Security Expo will return to Olympia, London from 28 – 29 September, reuniting the entire security market at the show’s first face-to-face event for over 18 months Over 14,000 vetted visitors will come together under one roof looking to source the latest security products......

  • Timothy Compston maps the road ahead for rapidly deployable tower solutions Fuelled by a sea change in communications, power, and surveillance technologies, rapidly deployable CCTV towers are now high on the agenda for commercial and governmental users across the globe, including the Middle East, as...

  • Many organisations rely on satellite technology but orbiting the earth doesn’t protect them from hackers. Daniel Norman, senior solutions analyst at the Information Security Forum explains why they are vulnerable and attractive targets Satellite assets are unique; they are often two-to-three y...

  • Gone are the days when the financial institutions’ (FI) only assets considered to be the gold, cash and other valuables in its vaults. With data widely acknowledged as the new gold, ensuring that only legitimate people get access into the FI’s premises and digital databases......

  • Chris Stephens, head of fraud & security analytics at Callsign looks at the rise of internet scams and how to prevent them Fraud costs the global economy US$5 trillion each year, which is around $700 per person worldwide, according to accounting firm Crowe. The rise......

  • Timothy Compston maps the road ahead for rapidly deployable tower solutions Fuelled by a sea change in communications, power, and surveillance technologies, rapidly deployable CCTV towers are now high on the agenda for commercial and governmental users across the globe, including the Middle East, as...

  • How can you detect a potential social engineering attack? Social engineering attacks such as phishing, ransomware, or pretexting are dangerous and often hard to pinpoint. In order to protect your organization against cyber threats, it’s very important to detect them as soon as possible and......

  • Working in partnership with Oslo Airport to install the RTT110 EDS system presented Rapiscan Systems with not just one, but two unique challenges.  The first was creating a proprietary water cooling system that worked in tandem with the airport’s green initiatives, and the second a ‘Level 4’ review ...

  • SME talks to Fahmi Jabri, general manager, Honeywell commercial security, Middle East, Turkey and Africa how they are putting health & safety at the heart of their security offering  How well has the security industry adapted to the changing health & safety situation? The security......

  • Timothy Compston considers the state of play of recording and storage for video surveillance There is little doubt that these are dynamic times when it comes to the recording and storage architecture associated with video surveillance applications across the Middle East region and beyond. Solutions....

  • Genetec shares the results of its ‘Physical Security in EMEA 2021’ report, based on insights from over 1,500 physical security professionals which show how physical security teams across Europe, Middle East and Africa (EMEA) are leveraging technology to manage both short term needs and long-term pri...

  • The construction industry may not appear to be an obvious target for cybercrime, but it garners unwanted online attention just like other sectors. According to the Cost of Data Breach Report 2020 by IBM, the average cost of a data breach in the industrial sector......

  • “Successful systems integrators also understand the importance of securing what they sell,” says Matt Barnette chief executive officer of the PSA Security Network – the world’s largest system integrator consortium At PSA Security Network, we have seen key attributes that make up the most succe...

  • In the first of his regular new information security columns for Security Middle East, Daniel Norman senior solutions analyst at the Information Security Forum (ISF) looks at how criminals exploit the ‘accidental insider’. Profiling and understanding key threats posed to an organisation ...

SecurMiddleEast Events Series; June 17th Dubai & June 21st Qatar – CLICK HERE to register your interest