David Noël, Regional Vice President, Southern Europe, Middle East & Africa at AppDynamics, has highlighted the need to protect technologists as digital transformation continues to ramp up across the region.
Veritas outline key processes needed to mitigate ransomware attacks
Mark Nutt, Senior VP EMEA at Veritas Technologies, examines how businesses can mitigate ransomware and inside threats in an exclusive op-ed for June’s edition of CNME.
Why customer experience will define the next era of technology
Customer Experience Defines the Next Era of Technology.
Unleashing the Possibilities of 5G
Intel is Foundational to Unleashing the Possibilities of 5G.
Reinventing without a roadmap: why now is not the time to take your foot off the gas
The pandemic brought into sharp focus what many businesses knew already; they were comfortable with business as usual and keeping the lights on, but were not equipped to respond to the challenges of implementing broad organisational change, quickly and without a roadmap. Despite this, organisations everywhere stepped up to the plate and adapted their business models to respond to the needs of their customers.
Three Areas to Consider to Optimise Your Business
The most successful businesses continuously assess their own performance to evaluate and introduce different ways to optimise their operations, whilst retaining a high standard of service excellence.
How the Disposable Nature of Tech is Putting your Businesses Data at Risk
It’s important for IT teams to understand all the risks as their companies take on more flexible working arrangements in the new future. A huge part of this is of course understanding the risks that come with using personal devices, particularly in the process of discarding them or sending them to a new home.
Comprehensive asset management is the prerequisite of effective security
Now that multi-cloud and hybrid workplaces are adding multiple layers of complexity to technology stacks, security teams can be overwhelmed with alerts. By thoroughly profiling every element of the network and applying some basic automation, threat hunters can compile a more manageable to-do list – one that ensures clarity and purpose. Some items may be quick wins, such as simple software patching or reconfiguration. Others may be more complex but require immediate action because of the potential harm they could cause. And others may be trivial and can be ignored.
IDC study reveals the value of Red Hat Certification
IDC study reveals the value of Red Hat Certification.
Ensuring IoT Security in the Era of Digital Transformation
Abrar Ullah, Assistant Professor at the School of Mathematical and Computer Sciences in Heriot-Watt University Dubai, share his top three IoT security recommendations for businesses operating in the era of rapid digital transformation.
Four Steps to Hybrid Workplace Success
As vaccinations roll out across the region, the move to hybrid working presents many new challenges for organisations, but it is also indicative of a greater business challenge – constant change and uncertainty. 2020 proved that it is no longer enough to prepare for the next thing. Organisations, and their networks, must be prepared for everything.
Adoption of technology & public-private co-operation is needed to fight money laundering in ME
Adoption of technology & building public-private co-operation is the need of the hour to fight money laundering in the Middle East.
Ransomware on the Rise
Ransomware is on the rise again. A recent industry report found that ransomware attacks increased by 150% in the last year, while blockchain research firm Chainalysis saw a 311% increase, year on year, to the end of 2020 in the number of actual ransomware attacks. Ransomware is also a growing concern in the Middle East region, as attack frequency and sophistication rose significantly since last year.
An Edge Computing Breakup: Out with the Old, and In with the New
When COVID-19 arrived in early 2020, enterprises’ first priority was to patch together a communications and information-sharing infrastructure that could sustain operations until work could return to normal. More than a year later, returns are on hold, and enterprises are rethinking their visions of “normal.” They’re reimagining their workplaces and their business practices, embracing more flexible models that take advantage of the benefits of edge technologies.