Wanted: Hackers for hire. Or in British government parlance: "Committed and responsible individuals who have the potential to carry out computer network operations to keep the U.K. safe." Ready to apply?
The FBI is offering a big-stakes reward for an alleged criminal who ranks at the top of its "cyber most wanted" list. But one cybercrime expert asks: "Would you cross the Russian mafia or some organized crime gang for $3 million?"
Lenovo issues an emergency patch to fix flaws in the System Update software that it preinstalls on business-focused Windows PCs after security researchers discover vulnerabilities that could be used to remotely compromise machines.
The Abu Dhabi government is investing in the healthcare industry and encouraging cloud and virtualization technologies for better productivity. George Yacoub of SEHA sees immense security challenges ahead.
With the upcoming release of Windows 10, Microsoft plans to inaugurate 24/7, cloud-based patching, among other new security features. Businesses can tap the anytime patches or define their own patch-release schedules.
Oman is dealing with the challenge of increasing cyber incidents and a rise in cybercrime and so on. How does Oman's CERT address this surge? OCERT's head, Al Salehi, shares his 2015 cybersecurity agenda.
Is there a governance structure that can protect your network and customer data against future attacks? Oman Insurance's Bhatia discusses how security and business alignment is critical to data security.
As organizations increasingly focus on securing critical data, they mustn't overlook one huge vulnerability: enterprise email. Steven Malone of Mimecast discusses the latest in unified email management.
To better secure enterprise networks, as well as detect and respond more rapidly to data breaches, businesses need to know the who, what, where, when and why of all endpoints that connect to network resoruces, says ForeScout's Sandeep Kumar.
What will it take for the security leaders of 2020 to be the true guardians of their enterprises? Daniel Lohrmann shares insight in a keynote address from the Gulf Information Security conference in Dubai.
As the U.S. completes its payments migration to the EMV chip, merchants and card issuers should be bracing for an uptick in card-not-present fraud, says Carol Alexander, head of payment security at software provider CA Technologies.
(ISC)Â² and the Cloud Security Alliance have unveiled a new cloud security professional certification designed to measure advanced competence. Will training for the certification help professionals gain a better understanding of cloud security?
The buzz at RSA could be felt beyond the session rooms, not least in the Expo Hall, with demonstrations that tapped Google Cardboard and offered an array of enticing tchotchkes - including selfie sticks and sharks with laser pointers on their head.