C3M’s Cloud Control cements Distribution Agreement with Value Added Distributor SCOPE Middle East

C3M, LLC the San Francisco based Cloud Security and Cloud Compliance vendor today announced the signing of a business partnership with UAE headquartered value-added security distributor SCOPE Middle East as part of its global expansion strategy bringing the Cloud Control Platform to the Middle East. Cloud Control, is a cloud security and compliance management platform that offers automated and actionable cloud security insights to help enterprises automate cloud security monitoring and management, and enforce security best practices as it continues its global expansion…

0 Comments

SCOPE ME, Kaspersky expand distribution agreement for Saudi Arabia

Following a successful partnership across the LEVANT region, Kaspersky and SCOPE Middle East (ME) are now expanding the relationship into Kingdom of Saudi Arabia. This includes Kaspersky’s comprehensive security portfolio including its endpoint protection and number of specialised security solutions and services. According to SCOPE ME, through its skilled expert teams and wide partner network, it will promote and sell the brand with aggressive demand generation and awareness programmes, as well as on-the-ground sales and technical support. “We are extremely glad to further…

0 Comments

The cybersecurity of Star Wars: The Rise of Skywalker

A report on attitudes to information security a long time ago in a galaxy far, far away, as exemplified in Star Wars: Episode IX. The long-awaited Star Wars: The Rise of Skywalker has finally hit the big screen. Not everyone has seen it yet, so we will not give away any spoilers or discuss the Death Star–size holes in the plot, or even the film’s artistic merits and demerits. We are interested in Episode IX solely from the standpoint of information security. So this post will cover…

0 Comments

Let’s punish phishing victims… er, you want to do what?!

There is a big, hairy elephant in the room when it comes to phishing: Many organisations believe that it’s okay, or right, or that they have no choice other than to punish people who repeatedly fail phishing simulations. Are they right? Before we answer that, let’s remind ourselves exactly what phishing is. What is phishing? According to the NCSC, phishing… “describes a type of social engineering where attackers influence users to do ‘the wrong thing’, such as disclosing information or clicking a bad link.…

0 Comments

What are Cloud Security and Posture Management tools?

Gartner had in its report published in early 2019, recommended that security leaders invest in cloud security and posture management tools to identify and remediate the risks of misconfiguration, mismanagement, and mistakes. Enterprises have since then started focusing on cloud security and are on the look-out for a dynamic cloud security solution but are still unaware of what tool to look for in a tool. Within the cloud security space, there are Cloud Access Security Brokers (CASBs), Cloud Workload Protection Platforms (CWPPs), and…

3 Comments

End of content

No more pages to load