#Proofpoint

physical security

Why physical security and cybersecurity should go hand-in-hand

A look at how organisations can shore up their cyber defences with the help of physical security protocols

report

New report reveals threat actors’ top social engineering tactics and campaigns

The 2022 Social Engineering Report analyses the key trends and techniques of socially engineered cyberthreats observed over the past year

Faces to watch: Cybersecurity leaders in MEA

We profile key corporate executives across the regional cybersecurity space

Phishing

Phishing attacks cost US businesses $14.8m annually: Ponemon Institute

Business email compromise and ransomware attacks prove most costly phishing threats to large businesses

Human

Human factor report reveals how 2020 transformed today’s threat landscape

More than 48 million observed messages containing malware capable of downloading ransomware foreshadowed the risk of recent cyber attacks

Home security

Firms reel from social engineering attacks

Call to realign IT security budgets to match BEC-dominated threat landscape

How Covid-19 has worsened corporate cybersecurity woes

As organisations struggle to spread the security umbrella to remote workers, experts urge renewed commitment to cybersecurity best practices

Cyber defence in the UAE: protect your people, protect your organisation

Organisations urged to embrace a people-centric approach to cyber security

Faces to watch: Game-changers in the regional tech industry

As organisations across the private and public spectrum in the GCC march ahead with digital and technology-centric transformations, we highlight the regional game-changers and stalwarts that are leading the charge

Human

Watch: How can UAE organisations prepare their people to deal with cyber threat risks?

Up to 39 per cent of UAE IT leaders say their employees “make their business vulnerable to a cyber attack”

Home security

Over 80% of UAE firms faced a cyber-attack in 2019: Are you protected?

With remote working, there is an added impetus on organisations to find and fix the weakest links when it comes to cyber security