Security challenge: Privileged access
How can you secure a network when users with privileged access are increasing the threat vector?
Read MoreHow can you secure a network when users with privileged access are increasing the threat vector?
Read MoreWhat are microarchitectural attacks – and is it possible to detect them through automated processes?
Read MoreBlack Hat Middle East & Africa (MEA), the cyber industry’s fastest-growing event, is on the move. This November’s second edition is relocating to the Riyadh Exhibition & Convention Centre, as it looks to record huge growth in floor space, exhibitors, national and industry pavilions, and speakers.
Read MoreWith over 25 years in the industry, Founder and CEO of Unit221b, Lance James shares his Zen-rooted approach to leadership.
Read MoreMulti-factor authentication (MFA) is widely promoted as an effective security method, but it does have vulnerabilities – as proven by the 0ktapus MFA attacks in 2022 and 2023.
Read MoreIn this interview, Lance James explains how he integrates Zen into his approach to cybersecurity leadership, and why imposter syndrome holds information security professionals back.
Read More