Internet of Things

What drives SDN adoption?
U.S. enterprises are looking to software-defined networking (SDN) providers to help them increase their agility and flexibility and enable remote working after the COVID-19 …

What you need to know about transatlantic data transfers
Where does data live and who can access it? This seemingly simple question is, in fact, incredibly complex in the cloud era, as servers often reside abroad and regional data …

Middle East ICT market expected to reach $95.05 billion by 2025
With the emphasis on reducing dependency on the oil industry, several Middle Eastern countries are formulating strategies to boost the contribution of the Information and …

Zero day malware reached an all-time high of 74% in Q1 2021
74% of threats detected in Q1 2021 were zero day malware – or those for which a signature-based antivirus solution did not detect at the time of the malware release – capable …

Digital transformation needs data integrity to be successful
The exponential growth of business data, coupled with advancements in cloud computing, AI, and the IoT has unleashed an era of digital transformation across the globe. This is …

Ransomware decreases as cybercriminals hit more lucrative targets
McAfee released a report examining cybercriminal activity related to malware and the evolution of cyber threats in the first quarter of 2021. The quarter saw cyber adversaries …

5G mobile subscriptions to exceed 580 million by the end of 2021
Ericsson projects that 5G mobile subscriptions will exceed 580 million by the end of 2021, driven by an estimated one million new 5G mobile subscriptions every day. 5G mobile …

Preventing security issues from destroying the promise of IoT
Internet of Things (IoT) devices fall into various categories. Some, such as those located in a hospital setting, are very sophisticated, with advanced operating systems and …

How a conference room speakerphone might let attackers into your company network
Several egregious vulnerabilities affecting the Stem Audio Table conference room speakerphone could be exploited by attackers to eavesdrop on what’s being discussed in …

Higher encryption adoption driven by rising data breach threats
Security and IT professionals in the Middle East are demonstrating a rising desire to secure critical applications and data, driving higher encryption adoption for newer use …

Happy birthday GDPR: IoT impact and practical tips for compliance
With the GDPR now in its third year, compliance with the EU data privacy regulation is still a significant issue for organizations to tackle, especially especially when it …

Security must become frictionless for companies to fully secure themselves
Ensuring adequate security in the face of a rapid increase in the quantity and sophistication of cyberattacks requires more effort and resources than most organizations are …
Featured news
Resources
Don't miss
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028