OPSWAT, a global leader in perimeter defense cybersecurity and pioneer of Deep CDR technology, hosted an incisive roundtable recently, on the topic “A Zero Trust Approach to Protecting Critical Environments.” The event, endorsed by ISACA UAE Chapter, drew a diverse group of C-level executives, industry experts, and cybersecurity professionals, all eager to delve into OPSWAT’s pioneering strategies for a secure digital future. The session began with a brief yet impactful introduction that set the stage for the discussion. Participants were welcomed to a dynamic exploration of the pressing challenges faced in safeguarding critical sectors, from utilities to healthcare and beyond. …
Tag: zero trust
Interview: Future of Identity Security
Rahil Ghaffar, VP – EMEA , WhiteSwan Security tells Anita Joseph how it’s crucial for organizations to prioritize identity security because compromised credentials can lead to breaches that are difficult to detect and can cause extensive damage. What are some common examples of identity-centric attacks in today’s digital landscape, and how do they exploit vulnerabilities in authentication systems? In today’s digital landscape, common identity-centric attacks include Phishing, Credential stuffing, Man in the Middle Attacks , SIM Swapping etc. These attacks exploit vulnerabilities such as weak passwords, lack of multi-factor authentication (MFA), or unsecured network connections, to gain unauthorized access to user …
READ MORE: https://www.tahawultech.com/news/security/interview-future-of-identity-security/
OPSWAT roundtable discussion takes a deep-dive into Zero Trust security
Presented by Sertan Selcuk, from OPSWAT, the discussion titled Zero-Trust Approach to Protecting Critical Environments delved deeply in an analysis of decades of company data and insights.
The evolution of zero trust
Dave Russell, Vice President, Enterprise Strategy at Veeam explores how zero trust security processes have evolved in recent years and how in a landscape where the benchmark for security is constantly shifting, zero trust must continue to adapt in order to survive.
READ MORE: https://www.tahawultech.com/features/the-evolution-of-zero-trust/
Interview: Skilling next-generation cybersecurity professionals
Anita Joseph caught up with Ned Baltagi, Managing Director – Middle East, Turkey, and Africa at SANS Institute, to find out more about cybersecurity in the region and how SANS is committed to equipping professionals with the required skills. What role does the SANS Institute play as a leading and dynamic thought leader in the cybersecurity sector, and how does its influence shape the industry’s landscape? At SANS, we are committed to developing the next generation of cyber leaders globally. With more than 85 training courses that cover a broad spectrum of topics, ranging from foundational courses to highly specialized …
HPE and Intertec Systems unveil cutting-edge innovations at GITEX Global 2023
Veronica Martin spoke to Michael Langeveld, Head of Technology & Business Development EMEA at HPE and Swapnil Gandhi, Director of Infrastructure & Cloud at Intertec during GITEX Global about the new products and solutions they are demonstrating and launching, key technologies and trends driving innovation and the importance of GITEX. Can you tell our readers what new products and solutions you are demonstrating and launching here this week at GITEX Global? Michael: Generative AI is a key topic right now, so we’re demonstrating some of our capabilities around large language models, video and voice. We are also showing our …
Exclusive Interview: Aloysius Cheang, Chief Security Officer, Huawei Middle East and Central Asia
Anita Joseph caught up with Aloysius Cheang, Chief Security Officer at Huawei Middle East and Central Asia, to find out …
Introducing content disarm and reconstruction – the zero-trust rebel that frisks every file
Instead, let us consider technology that does not rely on detection but follows zero-trust principles and assumes all files are malicious. This method works by first verifying a file’s type and identifying any embedded content. It removes any content it considers to be potentially malicious and reconstructs the file using only legitimate components. We call this sanitisation method “content disarm and reconstruction”, or CDR.
Tahawultech.com & ISACA UAE Chapter host first edition of Infosec & Cybersecurity Congress
Tahawultech.com & ISACA UAE Chapter hosted the first edition of the Infosec & Cybersecurity Congress at the Habtoor Grand Resort, …
Exclusive Interview: Israr Ashfaque, Vice President – Smart Business Solutions, Raqmiyat LLC
Israr Ashfaque, Vice President – Smart Business Solutions, Raqmiyat LLC tells Anita Joseph in an exclusive interview, how sustainability and …