Latest news
Check out our recent blogs and announcements to stay current
on the latest product and solution updates!
Broadcom's DLP cloud PoP for Saudi Arabia is officially operational and accepting customers
Cloud Access Security Broker Gateway is now operating within KSA data sovereignty
Broadcom’s Data Loss Prevention (DLP) cloud point of presence (PoP) for Saudi Arabia is now officially operational and accepting customers.
This reinforces data sovereignty and enables organizations to accelerate their cloud transformation with confidence, compliance, and uncompromised security while benefiting from the full capabilities of Broadcom’s global DLP platform.
A new legend is born. Introducing the one and only.
Symantec and Carbon Black reshaping the future of cybersecurity. Again.
After hearing the call of under-resourced SOCs, they’re delivering Symantec CBX, a unified XDR platform that solves the problems created by disparate tools and disjointed stacks—and the first of its kind to integrate the best capabilities of Symantec and Carbon Black.
7 Awards. One Incredible Partnership
Today is a proud moment for MBCOM Technologies
We’re honored to be recognized by Broadcom with seven partner awards — a powerful reflection of the partnership we’ve built and the passion our teams bring every day to supporting customers across the region.
MBCOM Appointed as Broadcom Education Services Partner for VMware Portfolio
MBCOM has expanded its role as a Broadcom Education Services Partner to include VMware training
This enhancement to our educational services portfolio allows us to offer a broader range of learning opportunities and deliver official training and certification programs for the entire VMware portfolio, including the latest features in VMware Cloud Foundation (VCF).
Ready to Take on Application Control? Read This First.
7 proven practices for adopting a positive security model and making it stick
With a positive security model, you decide who's allowed in and everyone else gets stopped at the door. This default-deny approach isn't new to application control—and denying access by default is a key tenet of Zero Trust strategies—yet fear of a perceived heavy lift, extra people power, or the risk of blocking critical applications still scares off the organizations who need it the most.
This Email Sounds Like It Came From Your Boss. But It Didn’t.
The red flags of email impersonation, real world examples and what to do about it.
Email impersonation remains one of the most persistent threats in cybersecurity. In this blog, I’ll walk through how impersonation attacks have developed over time, the techniques attackers use today and how you can protect your business from becoming a target.
But what exactly is email impersonation?
3 SSE Adoption Principles to Live By
How to overcome hidden hurdles and accelerate adoption, as told by Broadcom experts
Security Service Edge (SSE) transformations are complex, but they don’t have to be painful. The best way to ensure success is to go to the experts—the SSE veterans who’ve seen every misstep and triumph in the book—so that you can anticipate hurdles and set the straightest path to a smooth and successful adoption.
We’ve summarized a few of the webinar’s critical takeaways below.
Using AI to Predict, Stop and Recover from the Next Ransomware Incident
Introducing Incident Prediction, an industry-first capability that can accurately predict an attackers’ next four or five moves with up to 100% confidence
Our research has found that a large number of attackers use legitimate software, in an approach known as living off the land (LOTL) techniques, to carry out their attacks. Malware tends to be deployed sparingly and may only appear at the conclusion of an attack (such as when a ransomware payload is deployed).
How To Optimize Your Data Pipelines For Business Outcomes
In his latest piece for the Forbes Technology Council, Serge Lucio lays out a clear case for why optimized data pipelines are critical not just for IT, but for real business outcomes. From missed SLAs to compliance risks and alert fatigue, fragmented data operations cost time, trust and money.
SMS OTPs Aren’t As Secure As You Think
Why It's Time for a Change
In today's digital world, passwords comprise the default security protection for most users and accounts, and SMS one-time passwords (OTPs) are a popular way to add a second form of authentication. But attackers know this, and SMS OTPs aren’t keeping up with the latest techniques. Despite their widespread use, SMS OTPs are leaving businesses exposed to a host of threats.
TCP Monitoring With AppNeta: Why Expanded Support is a Game Changer
Broadcom continues to expand the capabilities of AppNeta by Broadcom, offering ongoing enhancements in features and value. With the introduction of TCP protocol support, users can now achieve more streamlined setup processes and deeper visibility into modern network paths. These enhancements help eliminate blind spots and improve monitoring accuracy across complex network environments.
Your Guide to Data Governance in an AI-Driven World
AI tools will be used in your work—here’s how to make them safe
With organizations of all sizes rushing to deploy AI platforms to streamline workflows and even assign tasks to AI agents, concerns about data governance should be top of mind for security teams.
How can organizations use AI tools without putting their data at risk?