
Trellix released its Advanced Threat Research Report: January 2022, examining cybercriminal behavior and activity related…
Trellix released its Advanced Threat Research Report: January 2022, examining cybercriminal behavior and activity related…
According to research by Tenable, the Cyber Exposure company, at least 40,417,167,937* records were exposed…
Ben King, the CSO for EMEA & APAC at Okta share’s Okta’s security predictions for…
Mike Sentonas, CTO at CrowdStrike shares security predictions for 2022 Ransomware double extortion gives rise…
Chris Berry, CTO and GM of Security Solutions, and Brandon Logsdon, President and GM, Marketing…
Ben King, the CSO for EMEA & APAC at Okta share’s Okta’s security predictions for…
Gregg Petersen of Cohesity discusses the 5 steps Middle East organisations need to take if…
Netwrix, a cybersecurity vendor, announced the release of Netwrix SbPAM 3.5. This solution simplifies how…
Emad Fahmy, Systems Engineering Manager, Middle East, NETSCOUT, explains how threat intelligence helps enterprises defend…
Research highlights disconnect between perceived threat and preparedness that results in longer incident response cycles…
Copyright notice This website and its content is copyright of Security Buyer – © Hand Media International LTD 2021. All rights reserved. Any redistribution or reproduction of part or all of the contents in any form is prohibited other than the following: you may print or download to a local hard disk extracts for your personal and non-commercial use only you may copy the content to individual third parties for their personal use, but only if you acknowledge the website as the source of the material You may not, except with our express written permission, distribute or commercially exploit the content. Nor may you transmit it or store it in any other website or other form of electronic retrieval system.