Layale Hachem, senior solutions engineer at BeyondTrust explains how businesses can defend against IABs by enforcing least privilege, enhancing multi-factor …

Layale Hachem, senior solutions engineer at BeyondTrust explains how businesses can defend against IABs by enforcing least privilege, enhancing multi-factor …
Vishal Minocha, Infor vice president of product management, looks at the importance of integrating robotics with a modern warehouse management system (WMS) to optimise productivity and performance within the warehouse.
With human control and moderation, GenAI models have the potential to revolutionise enterprise environments.
James Harvey, CTO Advisor, EMEA, Cisco AppDynamics has penned an exclusive op-ed which examines how UAE businesses are switching to …
With the explosion of digitisation across industries, opportunities for fraud and financial crime have grown exponentially.
Because MFA is a significant improvement over password-only authentication, it is here to stay, so cybersecurity practitioners must address its vulnerabilities.
Paul Lalovich, Managing Director at Agile Dynamics, has said that some of commentary regarding the demise of blockchain is very …
Ekta Puthran, Head of Sales APAC & MEA – Collaboration, at Barco, has penned an exclusive op-ed, which outlines how businesses need …
Fady Younes, Cybersecurity Director, EMEA Service Providers and MEA, Cisco has penned a thought-leadership article that provides businesses and employees …
Ezzeldin Hussein, Sales Engineer Director at SentinelOne tells Anita Joseph how the role of the CISO has evolved from being …
Behavioural correlation of events from multiple sources helps to act faster, get more attack context and start looking for previously unseen activities.
Brendan Gibbs – Senior VP, Automated WAN Business at Juniper Networks highlights how Juniper’s Cloud Metro solution has gained significant …
Vibin Shaju, VP Solutions Engineering EMEA at Trellix, explains how XDR is crucial for cybersecurity in GCC as organizations seek …
Threat actors understand that people hold access to an organisation’s most critical data, and that many can easily be tricked into unknowingly putting the security of their organisation in jeopardy.