Securing the post-perimeter world Inbox x

How do you protect your organisation’s data in a world where traditional security perimeters no longer exist? As your data moves to the cloud and your employees access data from anywhere on any device, traditional security perimeters no longer apply. This is the post-perimeter reality. As a valued Naseba member, watch the 2 minutes video and…

Fake mobile apps, a growing threat

The year 2017 has been marked by a growing number of stories about fake mobile applications. There is no reason to believe that this trend will reverse in 2018. Just a few days into the new year, Google removed 36 fake Android security apps from the Google Play Store. Since fake apps are a major cybersecurity threat, …

Machine learning and cyber security- an interview with Darktrace

Over the last few years, Middle Eastern economies have increased their dependency on technology and state-of-the-art ICT solutions to deliver high-quality, efficient, and effective services. With this increased dependency comes the need for organisations and governements alike to protect these critical infrastructure. We sat down with Mariana Pereira, a Director at Darktrace, the world leader…