Are chip-based, Wi-Fi enabled cards safe
Prashant Verma, AVP – Threat Management.at Paladion discusses the risks associated with Chip based credit cards or debit cards and how it can be countered by both users and issuers respectively.Read More…
Prashant Verma, AVP – Threat Management.at Paladion discusses the risks associated with Chip based credit cards or debit cards and how it can be countered by both users and issuers respectively.Read More…
A team of seven researchers has discovered more than 20 security vulnerabilities in OpenEMR, an open-source application used worldwide for the electronic management of the medical records of almost 100 million people.Read More…
Sreeraj Gopinathan, Head of Threat Anticipation Services at Paladion discusses the discovery of the threat, NetSpectre that is a variant on the new Spectre family of attacks and explains how it can infiltrate and compromise the security of a organization. Read More…
Written by Cameron Camp, security researcher at ESET Industrial Control System (ICS) security was ramped up at Black Hat USA – with packed sessions ranging from specific attacks to vulnerable hardware – all with the aim of protecting critical infrastructure, whose security shortcomings so frequently hit the headlines these days.Read More…
Saadi Kawkji, SE Director, Middle East and Turkey at Aruba, a Hewlett Packard Enterprise company uncovers the pros and cons of the digital workplace and how to approach the trend while balancing risk with experience. Technology has innumerable benefits for business. The explosive growth of devices, applications and networks haveRead More…
John Maddison, senior vice president of products and solutions at Fortinet explains that while cloud will be cloud, but not every cloud is same hence selecting cloud based security software is of paramount importance. An assumption made by many security professionals is that any performance differences between physical security devicesRead More…
Tomas Foltyn, security writer at ESET discusses the new format of cyber attack known as “Thermanator” and explains how an attacker can use your body heat against you in order to steal your credentials or any other short string of text that you have typed on a computer keyboard. Read More…
Anilesh Kumar, CEO at Levtech Consulting discusses the positive impact of artificial intelligence in the manufacturing industry and how it is the technology transforming the industry. The factories of today have started realizing the futuristic benefits of technology intervention. Manufacturers are finding new ways to grow, without compromising on productRead More…
The founder, president and CTO for Fortinet , Michael Xie shares his experience as he discusses key points about how to grow your tech business successfully.Read More…
Lukas Stefanko, Malware Researcher at ESET explains the tricks that are played on Google Play for misleading its users about the functionality of apps by displaying bogus download number. It seems that tricksters on Google Play have found another way to make their deceptive apps appear more trustworthy to usersRead More…
Claude Schuck, Regional Manager for Middle East and Central Africa at Veeam Software explains the five steps to achieve the GDPR compliance. There are still a vast number of organizations that have not taken the necessary steps to ensure GDPR compliance? The problem surrounding GDPR compliance is that it’s thoughtRead More…
John Madisson, Senior Vice President – Products and Solutions at Fortinet discusses the five major cybersecurity areas that need to be addressed in order for organizations to successfully secure their digital transformation efforts.Read More…
Copyright © 2026 - Zarks Media. All rights reserved
Stay ahead of the digital revolution in the Middle East & Africa