Cybersecurity articles

Interview with Georges Corm

Interview with Georges Corm

Reading Time: 8 minutes Now that the government has approved the 2017 budget, the question remains as to what new taxes or tax increases might be imposed. As Executive goes to print, the indication is that there will be some introduced, but it is not clear which, and Parliament will have to debate the budget before it is ratified

How to protect your email from cyberattacks

Reading Time: 7 minutes The numbers are overwhelming. Ten million malicious emails are prevented by Google every 60 seconds. Hold Security discovered a cache of 272.3 million hacked email accounts last year from major providers around the world, and more than half a billion personal records were stolen or lost in 2015, an increase of 23 percent from previous

Cyberthreats in the GCC and Middle East

Reading Time: 6 minutes Cyberattacks present themselves in a multitude of facets, although there is no absolute single definition for cybercrime in existence. From a general perspective, cybercrime can be defined as “illegal activities, internet mediated, that occur in the context of global economic networks”. The main categories of attacks are hacktivism, financial theft, data theft, ransomware, cyberespionage, cyberterrorism

The public sector’s vulnerability to a cyberattack

Reading Time: 6 minutes In Lebanon, the speed at which the government is moving and the speed at which cyberthreats are developing are totally different. Cyberdefense planning, it appears, is not much of a priority for the Lebanese government. The country does not have legislation to protect digital rights, lacks legal penalties to deter criminal cyberattacks and has only

Propaganda goes viral

Reading Time: 3 minutes “I don’t believe what I read in the papers, they’re just out to capture my dime.” – Paul Simon, Have a good time While propaganda is as old as time and political stakeholders have used the internet to spread their messages since the web’s early days, in 2016 propaganda went viral. It was also monetized

The Lebanese cybersecurity landscape

Reading Time: 7 minutes Overall, it is not clear what the local share of the global cybersecurity market – estimated by Gartner at $81 billion in 2016 – is or might be. Estimates and anecdotal evidence suggest, however, that the local market is still small. Salah Rustum, president of local firm Commercial & Industrial Enterprises of Lebanon (CIEL) and

Securing the entrepreneurship ecosystem

Reading Time: 5 minutes It’s 3 a.m. Despite your family’s “no Internet after dinner” rule, your smart, web-connected refrigerator is rebelling, repeatedly attempting to load the same site. The mustard is not trying to catch up on the news, your ice box has become a zombie in a hacker’s army – a botnet, in industry lingo. While the so-called

Cyber(in)securities

Reading Time: 11 minutes At the center of the cybersecurity issue in Lebanon resides, as with many issues in this country, an unfortunate and seemingly unmovable constellation. In one corner towers the banking sector as the primary force and primary concern for all things economic and also all things digital. The banking industry, as all the expert voices in

The battle between good and evil goes virtual

Reading Time: 7 minutes The serpent’s tale is a powerful narrative that has captured man’s attention over millennia. The contemporary version of the story goes something like this: the digital garden at first was created as a lush world filled with smart gadgets, useful computer programs, fun games, social networks and great business opportunities. People were delighted with these

Top