Dan Woodman, an associate professor of sociology at the University of Melbourne, has curated a new category for those born between 1977 and 1983, which he says are “a combination of the pessimistic Gen X-ers and optimistic millennials.”
iPhone X first impressions
Apple has selected a handful of bloggers and vloggers to review its much-awaited iPhone X. Here’s what they have to say.
The Big Data transformation and the future of consumer experience
Every day we walk into the store, we pause a bit and take a look at the items displayed. Our …
Beyond the appliance: Leveraging threat intelligence for cybersecurity
What underpins the security appliances is invisible, but plays a pivotal role in ensuring that those boxes block the threats that imperil your business.
BlueBorne attack: A closer look at Bluetooth vulnerabilities
In the age of digitisation, it is important to keep abreast with the latest information about the ever changing threat landscape and associated cybersecurity challenges.
Fortifying cybersecurity through compliance
Abdulrahman Alshetwey, CEO, Innovative Solutions, explains how cybersecurity posture can be improved within enterprises. The month of September was an …
Thwarting breaches with managed detection and response
By the time data breaches have run their course, it is often too late. The resulting loss of revenue, reputation, …
8 things more exciting than Apple’s new iPhone
The big day is nearly upon us. After many months of rumors, we’re finally going to get a look at Apple’s next-generation iPhone. Here are eight things to be excited about the event.
Examining VAT in the GCC
Aaron White, regional director, Sage Middle East, explains the implications of VAT being implemented in the UAE in 2018. On 1 …
Why boardrooms will prioritise innovation, data centres and security in 2018
The Middle East’s shift to digital business has created a dilemma for the regions CIOs. They need to innovate and implement change, while also retaining levels of control and management.
8 top cyber-attack maps and how to use them
Most of the cyber-attack maps online today are just ‘eye candy,’ but there are some creative ways they can be used.
Digital transformation reaches the seabed
Submarine networks are critically important to global communications and when there’s no ‘Plan B’, innovation and constant transformation is a …
5 things you should know about the upcoming Windows 10 update
Following Microsoft’s latest announcement on the Fall Creators updates, Tahawul Tech takes a look at what we can expect in the next wave of Windows 10 innovations.
The ‘Who’ and the ‘Why’ behind NotPetya
Late on 27 June, the New York Times reported that a number of Ukrainian banks and Ukrenergo, the Ukrainian state …