Cyber Attacks Ahead

Survey shows cyber breaches still massive concern for Fortune 500 companies

August 10, 2015 By Emma Procter

US – According to a recent 2015 Fortune 500 CEO survey, 66 per cent of respondents believe cyber security is one of the greatest threats for their business, These days, an increasing amount of sensitive data migrates to the Cloud and gets accessed remotely, which directly increases the

american-airlines-united

Cyber criminals hack into American Airlines, Sabre systems

By Emma Procter

US – Hackers have infiltrated the computer systems of travel reservations distributor Sabre and carrier American Airlines, but the companies have denied any sensitive information was taken. The incident was consistent with incursions by China-based hackers that recently targeted insurer Anthem and the US government’s personnel office, according to Bloomberg, which first reported

201505291513-1400-Blog_Fasttrack

Access control firm Paxton Access makes Sunday Times International Track 200 list

August 6, 2015 By Emma Procter

UK – Paxton Access, a global designer and manufacturer of electronic access control and door entry systems, has ranked 175th in the Sunday Times International Track 200.The award ranks Britain’s mid-market private companies with the fastest-growing international sales, measured over their latest two years of available

xcity-of-abha.jpg.pagespeed.ic.RFrhMHFkFD

Security lockdown as seventeen killed in Saudi mosque bombing

By Emma Procter

KSA – A bombing at a mosque in Saudi Arabia has killed 17 people, the official Al-Ekhbariya news channel has reported. A Saudi Interior Ministry official told the Associated Press that the bomb ripped through a mosque that was being used by security officials. The official, who

N_MECS

Middle East Cyber Security Summit, Oman, to tackle regional security issues

By Emma Procter

UAE – Cyber threats are a global phenomenon and are continually developing in sophistication and impact, despite the advances in cyber security technologies and practice. National and international governments in the region are determined to create a secure digital environment, but these initiatives are fragmented, tactical, and reactive. Given this scenario, The Middle