Inside the mind of a cyber criminal
Cyber criminals come in many different flavours, but the majority of them are in it for one thing: financial pay-off. They want the money that comes with offering their tools or services, selling stolen data,...
Cyber criminals come in many different flavours, but the majority of them are in it for one thing: financial pay-off. They want the money that comes with offering their tools or services, selling stolen data,...
Sameer Basha, Security Consultant GCC, Check Point Software Technologies – Middle East, discusses the importance of using threat hunting to defend against attackers on a network, as well as how threat hunting is...
Lior Div, CEO and Co-founder, Cybereason, asks how the US government should respond to the threat of persistent and highly damaging cyberattacks and considers what strategies should be deployed to reverse the...
Hardus Dippenaar, Senior Network Architect at Datacentrix, discusses why a Zero Trust policy is necessary and why organisations should embrace this particular approach to security. Our changing world, with its more...
Evgeniya Naumova, VP, Global Sales Network, Kaspersky, on the challenging market conditions and how the cybersecurity vendor is helping its enterprise customers to navigate the security challenges in tough times. The...
Insights from over 1,500 physical security leaders highlight cybersecurity as a strategic priority and accelerating adoption of cloud infrastructure for physical security. Genetec, a leading technology provider of...