Cybersecurity in the IoT World
Cybersecurity in the IoT World: How Telcos Can Secure Critical Infrastructure Against New Threats Over the last year, threat actors have launched a series of major attacks on critical infrastructure, an industry fast becoming one of the most targeted by…
Read More
May 9, 2022
One year removed from the Colonial Pipeline attack, what have we learned?
With May 7 marking the one-year anniversary of the Colonial Pipeline ransomware attack, James Carder shares his perspective on what enterprises should look out for to prevent more attacks such as this.
Read More
May 6, 2022
Attacks on IoT: The Call to Combat Rising Cyberthreats in the Telco Space
Attacks on IoT: In today’s cyberthreat landscape, threat actors are drawn to organizations that operate within critical infrastructure sectors, including telecommunications (telco), due to the potential to cause significant damage and disturbance to critical processes that benefit ordinary people and…
Read More
April 28, 2022
Cloud Security Needs to Become a Higher Priority
Mazen Dohaji, Vice President, iMETA, LogRhythm in conversation with Security Middle East and Africa talks about the evolving cybersecurity landscape and explained that with the cloud adoption gaining momentum, cloud security needs to be priority for the organizations in the region.
Read More
April 28, 2022
Five steps to protect against and recover from ransomware attacks
Ransomware attacks are on the rise and organisations of all sizes are falling victim. The attacks involve cybercriminals infecting a target’s IT infrastructure, encrypting vital data, and then demanding a ransom payment in exchange for the keys. Right now, they…
Read More
April 28, 2022
Best SIEM tools 2022: Compare Security Information & Event Management software
SIEM software collects log and event data for spotting and responding to security incidents. Read why LogRhythm’s SIEM Platform is an award-winning solution.
Read More
April 27, 2022