44 |
41
. expert opinion
Why attackers continue to target the network
44 . industry unlocked
UK ’ s most popular hotel brands putting customers at risk of email fraud
|
||||
Lynchpin Media and its publications look to maintain the highest standards in terms of quality of contents and images used . However , the current situation has led to some challenges with regards to photos and we apologise for any reduction in the quality of our products caused by this . |
48 |
36 |
74 48 . feature
Sameer Basha , Security Consultant GCC , Check Point Software Technologies – Middle East , discusses the importance of using threat hunting to defend against attackers on a network , as well as how threat hunting is beneficial to operations and creates a resilient cyber infrastructure .
|
55 . intelligent technologies
62 . business surveillance
Mind the gap : Five most common weaknesses in a business ’ cybersecurity
67 . decrypting myths
Experts discuss whether passwords are still fit for purpose
71 . go phish
Todd Moore , Vice President Encryption Solutions , Thales
74 . end point analysis
Tips for implementing Zero Trust – Taking trust away from security
|