Friday, May 17

Author: Amrita Agarwal

Microsoft highlights Zero Trust approach and mixed reality policing tools at GISEC 2023

Microsoft highlights Zero Trust approach and mixed reality policing tools at GISEC 2023

News
14 March, 2023; Dubai, United Arab Emirates – Microsoft today brought a message of collaboration and resilience to GISEC 2023, where the company participated as a Strategic Partner and staged a headline showcase that has the potential to revolutionize policing. “Microsoft Security recently surpassed a US$20-billion revenue milestone – the clearest signal yet that we are on the right track in protecting our customers from cyberthreats,” said Naim Yazbeck, General Manager of Microsoft UAE. “We treat security as a team sport, which has become even more important as we embrace the world of hybrid work. In the latter half of 2022, we launched more than 300 product innovations to help organizations stay ahead of evolving threats.”  This year at GISEC, Microsoft will be showcasing...
CyberKnight Highlights the Importance of Zero Trust Security at Gartner SRM and GISEC 2023

CyberKnight Highlights the Importance of Zero Trust Security at Gartner SRM and GISEC 2023

News
Dubai, UAE — February 27, 2023: CyberKnight announces its participation as a PremierSponsor at the Gartner Security and Risk Management Summit in Dubai on February 27-28,as well as one of the largest exhibitors at GISEC 2023 on March 14-16. CyberKnight will highlight to regional IT Security leaders, the importance of a holistic approach to Zero Trust when addressing today’s cybersecurity challenges. At both events, CyberKnight will also showcase market-leading international cybersecurity vendors. At the Gartner Security and Risk Management Summit, CyberKnight will be joined by: CounterCraft: Dec...
Measuring Outcomes and Mitigating Cyber Risks: The Importance of KRIs and KPIs in a Risk-Based Approach

Measuring Outcomes and Mitigating Cyber Risks: The Importance of KRIs and KPIs in a Risk-Based Approach

Channel
In today's ever-evolving business landscape, technology and cybersecurity have become critical components that enable modern enterprises to operate with enhanced efficiency and effectiveness. However, with the pervasive use of technology, organizations are increasingly exposed to sophisticated cyber threats that can result in severe consequences, including financial losses, reputational damage, and legal liabilities. It is important to note that effective cybersecurity management goes beyond just managing technology risk and involves managing business risk. To this end, organizations must view cybersecurity as a strategic imperative that is integrated into their overall risk management framework. Board of directors in any enterprise plays a critical role in ensuring that an organizatio...
PhishRod Launches CyberIsland, A Freemium Game For End-User Awareness

PhishRod Launches CyberIsland, A Freemium Game For End-User Awareness

News
PhishRod, the leading anti-phishing & cyber security awareness solution provider announces the launch of, “CyberIsland” – A freemium game to aware & empower end users so they can play a role in protecting the digital boundaries of an organization.  CyberIsland is the quest of an end user to navigate through the cyber threat landscape using gamification. The quest starts with the map that guides the end users on how to navigate through Phishing Island, Ransomware Zone, Malware Dock, Bay of Insider Threat, and Strait of Social Engineering with the ultimate objective to reach CyberIsland.  “End-user awareness is a critical component of the cyber security strategy of every organization. Our vision is to provide innovative ways to achieve end-user awareness and Cyb...
Malicious Hacking in the Past Year elucidates 80% of healthcare data breach

Malicious Hacking in the Past Year elucidates 80% of healthcare data breach

Articles
In past years, healthcare data breaches have been predominantly caused by human error and internal issues, such as unauthorized disclosures, loss, theft, and improper disposal of sensitive information. Nearly 80 percent of health data breaches reported to the HHS Office for Civil Rights (OCR) in 2022 were attributed to hacking and IT incidents.  These types of breaches can occur as a result of staff members not following proper protocols or failing to properly secure patient data. For example, a staff member may leave a laptop containing patient information in a public spot, or may accidentally send an email containing protected health information to the wrong recipient. These types of breaches are preventable and are usually driven by a lack of proper training, protocols, and oversigh...
PayPal Confirms Data Breach In a Massive Stuffing Attack

PayPal Confirms Data Breach In a Massive Stuffing Attack

Articles
According to the PayPal notification of the security incident, an unauthorized party tried to access nearly 35, 000 PayPal user accounts. PayPal’s servers were not hacked; in fact, the reason for hacking was a ‘credential stuffing attack’ meaning that the attackers used a list of stolen usernames and passwords to try and gain access to these accounts, and were successful in accessing some of them. This took place from December 6 to December 8, 2022. PayPal detected and mitigated it at moment. An internal investigation was launched to determine how the hackers gained access to the accounts. Within two days, the hackers had access to account holders' full names, dates of birth, mailing addresses, individual tax identification numbers, and social security numbers. As of December...
Xage Partners with CyberKnight to Bring Zero Trust Cybersecurity for OT Environments in the Global Energy Hub and Announces Middle East Expansion

Xage Partners with CyberKnight to Bring Zero Trust Cybersecurity for OT Environments in the Global Energy Hub and Announces Middle East Expansion

News
DUBAI, United Arab Emirates / PALO ALTO, Calif., Jan. 18, 2023 - Xage Security, the zero trust real-world cybersecurity company, today unveiled its expansion to secure and transform critical infrastructure operations throughout the Middle East—the top energy producing region in the world. Xage has opened offices in Dubai, United Arab Emirates and Riyadh, Saudi Arabia, while appointing Ray Kafity as Vice President to lead the regional team and spearhead the strategic expansion. To accelerate adoption across the Middle East, Xage has also partnered with Dubai-based CyberKnight, the leading zero trust cybersecurity distributor. "Cyber threats targeting operators in the Middle East are of international importance. Attacks on these companies don't just have regional implicati...
CyberKnight Revenue Growth Story Continues in 2022

CyberKnight Revenue Growth Story Continues in 2022

News
Strong Growth Momentum Sustained: CyberKnight Reports 95% Bookings Growth Y-o-Y Dubai, UAE — January 4th, 2023: CyberKnight, the pioneer of ‘The Art of Cybersecurity Value-Added-Distribution’, today announced its financial results for FY2022. In its third year of operation, CyberKnight continued to deliver robust revenue growth, reporting an increase of 95% in bookings over FY2021. This outstanding performance and accelerated growth for the third consecutive year are attributed to the company’s commitment to execution, paired with ongoing investments in people, product, and process. CyberKnight’s exceptional momentum is a testament to its 25-market leading Zero Trust Security focused portfolio vendors, deep engagement with more than 400+ partners, trusted advisor relationships wit...
Think Before You Click: Spotting and Stopping a Phish

Think Before You Click: Spotting and Stopping a Phish

Channel
Despite phishing being among the most well-known and expensive forms of cyberattack, 83% of organizations reported being victims of a phish last year. Here’s how to avoid getting reeled in. It’s nearly 3 p.m. and, despite three cups of coffee, you’ve barely made a dent in the massive backlog that didn’t even exist when you got in this morning. You decide to steal a precious few seconds between meetings and messages to check your email, hoping none of the four notifications you’ve just received are more requests. One in particular catches your attention: Someone has successfully logged into your email account from thousands of miles away. “If you don’t recognize this login,” the email warns, “change your password immediately.” Between worst-case thoughts of identity theft and rui...