Written by Cameron Camp, security researcher at ESET  Industrial Control System (ICS) security was ramped up at Black Hat USA – with packed sessions ranging from specific attacks to vulnerable hardware – all with the aim of protecting critical infrastructure, whose security shortcomings so frequently hit the headlines these days.Read More…

Saadi Kawkji, SE Director, Middle East and Turkey at Aruba, a Hewlett Packard Enterprise company uncovers the pros and cons of the digital workplace and how to approach the trend while balancing risk with experience. Technology has innumerable benefits for business. The explosive growth of devices, applications and networks haveRead More…

John Maddison, senior vice president of products and solutions at Fortinet explains that while cloud will be cloud, but not every cloud is same hence selecting cloud based security software is of paramount importance. An assumption made by many security professionals is that any performance differences between physical security devicesRead More…

Anilesh Kumar, CEO at Levtech Consulting discusses the positive impact of artificial intelligence in the manufacturing industry and how it is the technology transforming the industry.  The factories of today have started realizing the futuristic benefits of technology intervention. Manufacturers are finding new ways to grow, without compromising on productRead More…

Claude Schuck, Regional Manager for Middle East and Central Africa at Veeam Software explains the five steps to achieve the GDPR compliance. There are still a vast number of organizations that have not taken the necessary steps to ensure GDPR compliance? The problem surrounding GDPR compliance is that it’s thoughtRead More…

Sachin Bhardwaj, eHosting DataFort, Director, Marketing & Business Development speaks about the need for strengthening the security posture of an organization and offers some options to be prepared for cyberattacks in an age of increasing data breaches, accelerated by the rise of cloud computing, mobile usage and IoT implementations.Read More…