By: Bashar Bashaireh, Managing Director, Middle East & Turkey, Cloudflare Email is the most exploited business application. It is the primary initial attack vector for...
By Rafi Brenner, Vice President, Information Security at Fortinet. Cybercrime tactics such as phishing and social engineering, commonly used to infect critical systems with malware...
Discover the rising threat of MFA lookalike domains and how they are exploited for account takeovers By: Dr. Renée Burton, Sr Director of Threat Intelligence...
By Rob Rashotte – Vice President, Global Training & Technical Field Enablement at Fortinet Our global digital economy continues to grow at an unprecedented rate....
What many developers still need to understand about protecting containers By Michael Cade, Global Field CTO Cloud-Native Product Strategy, Veeam Despite it still feeling like...
By Kalle Björn, Senior Director, Systems Engineering Middle East at Fortinet Students today are surrounded by technology, from the phones in their pockets to the...
By Sandie Overtveld, SVP of Freshworks APAC and MEA The Arab Gulf’s relationship with technology has always been one of willingness and ambition. To build...
By: Rick Vanover, Senior Director Product Strategy, Veeam Amidst the sea of economic uncertainty, one thing is emerging as a non-negotiable for tech companies: a...
By Jadd Elliot, CEO at PangaeaX According to Datamites.com, Data science is one of the top ten most in-demand careers in the UAE. As per IBM, bachelor’s...