44 | 
  41 
 . expert opinion 
 Why attackers continue to target the network 
 44 . industry unlocked 
 UK ’ s most popular hotel brands putting customers at risk of email fraud 
 | 
||||
 Lynchpin Media and its publications look to maintain the highest standards in terms of quality of contents and images used . However , the current situation has led to some challenges with regards to photos and we apologise for any reduction in the quality of our products caused by this .  | 
48 | 
36 | 
74 48 . feature 
 Sameer Basha , Security Consultant GCC , Check Point Software Technologies – Middle East , discusses the importance of using threat hunting to defend against attackers on a network , as well as how threat hunting is beneficial to operations and creates a resilient cyber infrastructure . 
 | 
  55 . intelligent technologies 
 62 . business surveillance 
 Mind the gap : Five most common weaknesses in a business ’ cybersecurity 
 67 . decrypting myths 
 Experts discuss whether passwords are still fit for purpose 
 71 . go phish 
 Todd Moore , Vice President Encryption Solutions , Thales 
 74 . end point analysis 
 Tips for implementing Zero Trust – Taking trust away from security 
 |