Features

  • John Dix, Sales- Land Communications, Thales explores the role of data-centric security in complex future warfare. There were times when we couldn’t take doctors out in the field with us when I served, for a few good reasons: some were not commando trained and therefore......

  • Dr Mark Deakes, chair of the International Hologram Manufacturers Association, considers the role of holograms in protecting intellectual property (IP) and the Security Image Register. There can be little doubt about holography’s role as an active technology protecting intellectual property rights i...

  • With the growing digitisation of spaces and processes, the security of resources is becoming more and more of a concern. A huge part of a company’s revenue is spent on physical and IT security to ensure the safety of assets, human resources and the business......

  • With the advent of cheaper video technology and faster data processing techniques, video surveillance is becoming widespread in most public spaces in urban life. According to the verified market research report, the Video Surveillance market was valued at USD 54.21 billion and is projected to......

  • The UAE is in hacker crosshairs. A report last month found that nine out of 10 (87%) of UAE companies experienced a cyber incident in the past two years. Worse, three in four don’t possess the right tools to spot breaches. These figures underscore a......

  • MVP Tech, a Convergint company, explores how healthcare organizations can benefit by integrating biometric access control into their security infrastructures. Security attacks on medical facilities have become increasingly common, making robust access control measures crucial for healthcare organiza...

  • Integrated Design Limited (IDL) was tasked with improving secure access control for an energy supplier in Qatar across 10 interconnected high-rise towers. Company Overview A prominent energy supplier in Qatar was looking to enhance its security across 10 office buildings located in the central busin...

  • Ryad Soobhany, Associate Professor of Mathematical and Computer Sciences, Heriot-Watt University Dubai, unravels the use of camera technology in Middle East urban planning to enhance security. In the ever-changing landscape of the Middle East, where rapid urbanisation meets technological advancement...

  • John Hathaway, Regional Vice President, iMETA at BeyondTrust, says the path to cyber resilience is paved by privileged access management. IBM’s 2023 edition of its Cost of a Data Breach report puts the Middle East’s average data breach cost at US$8 million, which is almost......

  • Paul Lawson, Executive Director, Cyber Defense, CPX, takes us through insights and best practices from a recently launched whitepaper looking at the cybersecurity implications of AI adoption. The surge in AI adoption, exemplified by the widespread use of generative AI technologies and tools like Cha...

  • According to the UAE Strategy for Artificial Intelligence 2031, one of the goals of this country is to establish itself as a leading AI destination. As evidenced in McKinsey’s ‘Women at Work: Job Opportunities in the Middle East’ report, the Fourth Industrial Revolution is expected......

  • Women have been the pillars of economic growth since ancient times. Whether it is running a household, or leading high-worth corporations, women have had a high footprint in all sectors of business activities. They have been exhibiting business resilience, intelligence and competence through years a...

  • Passwordless implementation has long been heralded as the future, but are we ready, asks Mortada Ayad, Director, Sales Engineering at Delinea. We often hear about the increasing appetite for a passwordless future and while this mostly is in the context of consumers, the reasons for......

  • Dan Norman takes us through the ISF’s last two-year forecast – made in 2022 – to determine how accurate they were, and the measures organisations may need to take. Every year the ISF provides a detailed, scenario-based, two-year threat forecast to its member organisations –......

  • It’s full steam ahead as we begin to finalise preparations for the forthcoming Security Middle East Conference – an event that will once again define the security sector. We’re delighted to say that pre registrations are nearly at 50% for our second conference, with top-level......