ICT offers an incredible platform for achieving the Sustainable Development Goals (SDGs). Having already reached an estimated 20 million people with initiatives such as Connect to Learn, Reunite and Ericsson Response, Ericsson does not plan to slow down any time soon.
Budget planning is typically a give-and-take exercise, since all departments are fighting for those corporate dollars. Mathias Thurman from the Security Manager’s Journal discusses the importance of securing budgets for IT security.
As everything is becoming more mobile, so is document and data capture. Emma Isichei, Worldwide Category Director for Capture Solutions, Kodak Alaris, discusses the increasing need organisations have to capture on the move while maintaining the same workflow
The cybersecurity industry has come a long way from the time when anti-virus and firewall systems used to be the main tools for preventing and resolving data threats. Firosh Ummer, Managing Director, Paladion EMEA, explains why security intelligence is important.
If you want to tell someone to be more realistic you might say: “Get your head out of the clouds.” But in fact, you have to do the exact opposite if you’re an IT security professional charged with managing security in today’s increasingly cloud-based world.
Having joined Juniper Networks as Director Partner Sales, Middle East and Africa, earlier this year, Claire Jones shares company updates and the way forward for channel partners.
Maan Al-Shakarchi, Networking Lead, Europe and AMEA, Avaya, discusses the recent breach experienced by the Bangladesh Central Bank and shares insights on the importance of having a good network security in place.
Maan Al-Shakarchi, Networking Lead, Europe and AMEA, Avaya, discusses the recent breach experienced by the Bangladesh Central Bank and shares insights on how similar situations could be avoided.
This is the age of the web. With technology advances in cloud, mobile and social, the paradigm shifts in information management have and are moving fast – to the web. Web-based capture will be a game-changer for growth and survival of organisations in the Middle East. The advantages are huge!
Your employees are undoubtedly bringing their own devices to work, whether or not you have a BYOD policy in place. Rhonda Chicone, Faculty Member, Kaplan School of Business and Information Technology, explains why you should start settling on a BYOD policy now.
Bogged down by legacy systems and stubborn employees, Petroserv’s IT was suffering. The Qatari firm’s Head of IT, Mubarik Hussain, shares his story of how he instigated a complete technology overhaul, and has since reaped the rewards.
In the consumer world, mobility progressed in three general phases: initiation, evolution, and maturity. Although the consumer marketplace is now enjoying the benefits of the maturity stage, the enterprise world is still stuck somewhere between initiation and evolution.
The digital transformation of businesses globally, with emergence of Smart Cities is changing the very definition of security role, from being a technology centric to more of a business-centric executive role, forcing the security leaders to get more involved and be responsible for securing business processes and operational technologies that control Smart Cities and critical infrastructure of a nation.
Cricket Liu, Chief DNS Architect, Infoblox, discusses the potential of passive DNS in protecting network infrastructure.