By Mohammed Al-Moneer, Regional Sr. Director, META at Infoblox If you think you’re seeing double, you probably are. Website domains, that is. Yet, despite the...
By Adam Khan, VP Global Security Operations, Managed XDR, Barracuda In today’s digital business landscape, the battle against cyber threats demands a continuous, proactive, and...
By Edwin Weijdema, Field CTO EMEA and Lead Cybersecurity Technologist at Veeam Ransomware first rose to dominance as cybercriminals’ main weapon of choice way back...
By Shaista Ahmed, Director Channel, Alliances, OEM & Distribution – Emerging Markets at Nutanix Technology continues to advance at an extraordinary pace, with organizations across...
By Aamir Lakhani, Global Security Strategist and Researcher at FortiGuard Labs In the festive flurry of holiday shopping, cybercriminals are pulling out all the stops,...
By Grant Bourzikas, CSO Cloudflare Grant Bourzikas, Chief Security Officer at Cloudflare, offers a compelling glimpse into the impending shifts and challenges that are poised...
By: Bashar Bashaireh, Managing Director, Middle East & Turkey, Cloudflare Email is the most exploited business application. It is the primary initial attack vector for...
By Rafi Brenner, Vice President, Information Security at Fortinet. Cybercrime tactics such as phishing and social engineering, commonly used to infect critical systems with malware...
Discover the rising threat of MFA lookalike domains and how they are exploited for account takeovers By: Dr. Renée Burton, Sr Director of Threat Intelligence...
By Rob Rashotte – Vice President, Global Training & Technical Field Enablement at Fortinet Our global digital economy continues to grow at an unprecedented rate....