The Biggest Challenge for MSSPs is Noise From Fraudulent Actors

Arabian Reseller speaks to Amit Roy, the Executive Vice President and Regional Head for EMEA at Paladion, who says that there are many players on the market that want to cash in on the next-generation cybersecurity market. And that according to Roy, is the biggest challenge MSSPs face today...Read more

How Secure Are Chip-Based Cards?

Chip-based cards having Wifi icon work on RFID or NFC technologies (but not on WiFi). It operates in the nearby local field. This is like our MiFi based access card, which is flashed against a reading device to record our attendance or grant us door access. The user of such a card walks near to the payment terminal (RFID or NFC reader) and flashes the card and a debit happens...Read more

We Are Looking for Partners, Says Paladion

Channel Post speaks with Amit Roy, executive vice president and regional head for EMEA at Paladion about their strategic move to enter channel and how the company intends to grow its channel business, while retaining the direct business too in the Middle East Africa region...Read more

How Enterprises Can Secure Their Multi-Cloud Environments

A recent study produced by the Ponemon Institute shed light on global enterprises’ growing adoption of Cloud technologies—and the security risks involved in securing these Cloud-based environments....Read more

Artificial Intelligence in Cybersecurity: From Hype to Reality

Artificial intelligence in cybersecurity has recently made several headlines: "The Future of Cybersecurity: Artificial Intelligence" (Cybersecurity.CIOReview), "How AI is the Future of Cybersecurity" (Infosecurity Magazine) and "AI in Cyber Security Market to Grow at an Exorbitant Pace" (P&S Market Research)...Read more

Artificial Intelligence: The Next Generation of Cyber Defense

SecurityMEA speaks with Amit Roy, executive vice president and regional head for EMEA at Paladion on the rise of artificial intelligence and the role of AI in cyber defense especially as Paladion sets up its AI driven MDR services in the region...Read more

How AI Is Transforming Cyber Defense

Enterprises are going digital to leverage business advantage from faster time to market, automation efficiencies and execution speed. The race is on to achieve digital connectedness of their entire value chains. At the same time, cybercriminals see the increasing digitization as a window of opportunity. Cybercrime syndicates are actively targeting digital ecosystems including cloud infrastructure, software as a service (SaaS) offerings and internet of things (IoT) devices. Enterprises are faced with the challenge of pushing for greater gains in business advantage while balancing the risk of cyber exposure....Read more

Cybersecurity in Hospitality: An Unsolvable Problem?

A hospitality company’s vulnerability to a single point of failure is a massive weakness. Only one employee at one hotel needs to make one mistake to create a global crisis. And these failure points are likely. Hotel computer systems are in constant use from countless terminals. Most of the employees who interface with computers at hotels are not IT employees, nor are they trained to act sensitively to cyber security concerns. Many hotels utilise legacy systems, and even modern systems are rarely patched, updated, and protected...Read more

Securing The Base

Everyone believes that someday or another, they are going to have an incident but what determines whether it is a real breach or not is their ability to detect, respond and mitigate or remediate in time, or did they let it pass without being able to do anything about it..Read more

Why Artificial Intelligence in Cyber Security is Need of the Hour

A set of socket wrenches is not attractive. By itself, it won’t mend a car either. But in the hands of a skilled mechanic, there is little that cannot be repaired or improved. That is largely the situation with AI today. It won’t replace human security engineers neither can it handle cybersecurity on its own. However, it is now a critical tool for getting on top of cyber security, managing the volumes of threat data for better detection and response and keeping cyber defenses high enough to repel or evict attackers before any serious damage can be done.Read more