Enter your keyword

Qatalyst Newsroom

Recent Interviews, Posts, Videos and more!

All
Event News
Articles
Interviews
Partner's Articles
Social

Are you carrying a loaded cyber weapon?   Most of us know better than to use a USB stick that has been conveniently left somewhere. But even the most informed aren’t always careful. Would you be suspicious of a USB handed as a...

00

Discussing Connectivity From Above the Clouds.     Early this November, the Qatalyst team welcomed IIoT experts from across Europe to the IBM Watson IoT Headquarters. The venue was impressive, screaming innovation from every...

00

4 Ingredients That Make Israel a Cybersecurity Powerhouse.   With more start-ups and tech professionals per capita than any other country, it is no question that Israel is a booming cyber-tech hub of innovation. But how does a...

00

3rd ManuSec USA: Post-event Write Up.   For any business to ‘make it’ in the Fourth Industrial Revolution, there is an unnegotiable requisite: strengthening the protection of its key assets. This is particularly true for the...

00

Q&A with Gayathri Magie, Technical Leader, IBM Watson IoT.   IIoT is decisively moving from a possibility to a necessity. As technology matures, we must move from asking ‘what if?’ to ‘what next?’ IIoT Europe Summit will...

00

IIoT has convinced the world of its unprecedented opportunities for businesses –in fact, it is a game changer for the Industrial Sector, reducing costs and improving efficiency in ways we didn’t dare dream of just a few years ago. But...

00

CS4CA MENA: Government Officials & 100+ Industry leaders Discuss Cyber Security.   Understaffing and underinvestment place ICS security under constant risk in the MENA region, with over 40% of the region’s ICS computers...

00

NorSIS urges Norwegians to boost their cyber security awareness.   Norway ranked 4th in preparedness for the new digital economy by the World Economic Forum in 2016, and is indeed one of the most digitised countries in the world...

00

There’s No Technological Panacea to Save ICS From Cyber Threats- You Need Strong Foundations.   “We’re chronically late to the party” starts Jason on stage “…because we’re still trying to learn the lessons from the last 10-15...

00

A List of Badass Cybersecurity Women We Follow -And Why You Should Too.   The tech sector is a man’s land. Cybersecurity, specifically, has the biggest gender gap of all- with women occupying only 11% of it. This number has...

00

Seven Ways To Gain Employee Compliance On Cybersecurity Procedures. Cybersecurity is an absolute necessity for keeping customer information, as well as more general company data, safe. Without it, your business is exposed to a range of...

00

Cyber Security for Critical Assets MENA: How to protect your company from cyber threats. As part of a global series, Qatalyst Global is pleased to bring the 13th edition of the Cyber Security for Critical Assets Summit to Dubai on...

00

Amongst the multitude of things brought by the Fourth Industrial Revolution, two are certain: tremendous changes and the pressure to embrace them. With the rapid rise of technology transforming the way businesses are functioning,...

00

Operational technology (OT) is the beating heart of the critical infrastructures supporting our life standards. As infrastructures become increasingly elaborate, interconnected, and co-dependent, their disruption can afflict entire...

00

With the Industrial IoT revolution well underway data management is key to successfully guiding your company into Industrial 4.0 standards. With many aspects of Data Management. Today we look at its cores aspects including Data...

00

Fall brings an annual budgetary exercise for which many mid-level managers and executives will be unprepared. Unfortunately, according to Willis-Tower-Watson, “Among executives, there is little consensus on how to allocate cyber...

00

Here’s everything you need to know about the upcoming UKSec Summit The inaugural UKsec Summit is the only summit designed by & for the service sector, with the purpose of creating a special platform for industries that are...

00

Cyber Security for Critical Assets Summit Returns to London on October 2nd & 3rd After four successful editions, Cyber Security for Critical Assets Europe returns for a 5th successive summit this October, as part of the CS4CA...

00

  Yards from the Tower of London, a proud symbol of national security for centuries, delegates gathered for this year’s Cyber Security for Critical Assets Europe Summit. Over coffee and pastries, there were conversations in...

00

Our events are a strategically positioned for top level executives

View Events

WHERE WE WORK

qatalyst-global-background

Pin It on Pinterest

Never Miss An Event!

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!