By Rafi Brenner, Vice President, Information Security at Fortinet. Cybercrime tactics such as phishing and social engineering, commonly used to infect critical systems with malware...
Discover the rising threat of MFA lookalike domains and how they are exploited for account takeovers By: Dr. Renée Burton, Sr Director of Threat Intelligence...
By Derek Manky, Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Fortinet With the growth of Cybercrime-as-a-Service (CaaS) operations and the...
By Rob Rashotte – Vice President, Global Training & Technical Field Enablement at Fortinet Our global digital economy continues to grow at an unprecedented rate....
What many developers still need to understand about protecting containers By Michael Cade, Global Field CTO Cloud-Native Product Strategy, Veeam Despite it still feeling like...
By Margareta Petrovic, Global Managing Partner, Risk & Cybersecurity Consulting & Service Integration and Dr. KPS Sandhu, Head of Global Strategic Initiatives, Cybersecurity at TCS....
By Gregg Ostrowski, CTO Advisor, Cisco AppDynamics Within many IT departments, security teams (SecOps) have traditionally operated in isolation from other functions such as DevOps...
By Kalle Björn, Senior Director, Systems Engineering Middle East at Fortinet Students today are surrounded by technology, from the phones in their pockets to the...
By Sandie Overtveld, SVP of Freshworks APAC and MEA The Arab Gulf’s relationship with technology has always been one of willingness and ambition. To build...
By George Kurian – CEO at NetApp Artificial intelligence (AI) has recently been described in many ways—revolutionary, an economic game changer, a “beast” that is...