Securing the post-perimeter world Inbox x

How do you protect your organisation’s data in a world where traditional security perimeters no longer exist? As your data moves to the cloud and your employees access data from anywhere on any device, traditional security perimeters no longer apply.…

Read more

Fake mobile apps, a growing threat

The year 2017 has been marked by a growing number of stories about fake mobile applications. There is no reason to believe that this trend will reverse in 2018. Just a few days into the new year, Google removed 36 fake…

Read more

Machine learning and cyber security- an interview with Darktrace

Over the last few years, Middle Eastern economies have increased their dependency on technology and state-of-the-art ICT solutions to deliver high-quality, efficient, and effective services. With this increased dependency comes the need for organisations and governements alike to protect these…

Read more

[cp_modal id=”cp_id_f2df8″] [/cp_modal]