Home Page Banner

Critical sectors in the UAE – including but not limited to finance and energy – have increased their dependency on technology and state-of-the-art ICT solutions to deliver high-quality, efficient, and effective services. In 2017, the financial cost of cybercrime totalled

Black Hat USA

Black Hat USA is the world’s leading information security event, providing attendees with the very latest in research, development and trends. Black Hat USA 2018 opens with four days of technical Trainings (August 4 – 7) followed by the two-day

MESCON Conference

MESCON : Regional cyber security conference to reach out to more than 7000+ security professionals. MESCON brings to you the best of industry experts to talk on various pressing topics that help the security community to learn and address the

The Gulf Information Security Expo & Conference (GISEC) brings together over 7,350 top IT security and tech sector professionals to discover cutting-edge solutions, share insights with industry experts and equip themselves with the right tools to protect their businesses from

MENA CISO SUMMIT

Security breaches have now become inevitable and the approach of corporates and governments have moved from prevention to resilience. While emerging technologies are becoming double-edged swords, the role of the Chief Information Security officer needs to be established clearly to

RSA Conference 2018

RSA Conference 2018 Asia Pacific & Japan is the leading information security event in the region. And with good reason. Join the three full days of industry know-how, unbeatable content and invaluable networking opportunities. Tap into a smart, forward-thinking global

Goa 2018, India Training: 27th Feb – 1st March Conference: 2nd March – 3rd March Events Speakers Interact with globally renowned security researchers, hear them share their experience and expertise Training Get hands-on technical training on various security topics Exhibition

OPCDE : short for operational code, it is a number that determines the computer instruction to be executed. The most technical security conference of the Middle East, holds its annual and inaugural event on April 6-7, 2018 at the Dubai

Ransomware & malware multiply Ransomware has been a cash cow for criminals, as well as a disguise for more destructive purposes; for example, Petya looked like ransomware but caused damage by locking up data. All types of users – from

CyberCureME – The Cyber Security Marketplace delivers the latest news and publications in the field of Cyber Security. Designed to provide the most relevant and in-depth information on all facets of Cyber Security to professionals.

Threat landscape

The FortiGuard Labs threat research team analyzed real-world threat data from around the globe to create this insightful report. It not only shares findings on the most prevalent exploits, malware, and botnets, but offers observations on threat variance by region

On December 22nd, 2014 Mr. Joseph Gross retained the assistance of Dr. Ashley Podhradsky, Dr. Matt Miller, and Mr. Josh Stroschein to provide the testimony as the expert in the process against pedo’s on Tor. The suspects are accused in