Haider Salloum, SMB Channel Director, Microsoft Gulf, says partners need to position themselves as trusted advisors to help customers mitigate …
Why telco providers should reduce their hardware footprint
Mohammed Al-Moneer, regional director, A10 Networks MENA, discusses why Middle East telcos should invest in the future and modernise their infrastructures.
How can technology enable a healthy work-life balance?
Arthur Dell, director, Technology and Service, MEA, Citrix, analyses how technology is providing enhancements in patient care within the region, …
What it takes to be a successful chief data officer
The growing importance of the chief data officer reflects the central role of information in digital business, says Gartner’s research director Alan Duncan.
What Apache vulnerabilities really mean
Struts, the vulnerability recently found in a popular form of software (Apache Struts 2) offered by open source community, “The …
Let’s talk about doxware
Rishi Bhargava, Co-founder and VP Marketing, Demisto, gives us a lowdown on the latest threat looming in the cyberspace.
Detecting threats in real-time
Ben Bernstein, CEO, Twistlock, shares six runtime threat detection and response tips for container security.
Big Data – the heart of the digital transformation
Marco Pozzoni, EMEIA E-Series Sales Director, NetApp, shares top reasons why Big Data analytics is the heart of the digital transformation.
Key questions to ask before making the leap to SD-WAN
Nirav Modi, Vice President and General Manager, Blue Planet, discusses key questions to address before making the leap to Software-Defined WAN.
Best practices in dealing with cybercrime
What are the top cybercrime activities businesses need to watch out for, and what can be done to combat them?
A look ahead for the security industry
By focusing on hardening the physical security systems we have to be sure that we have three elements: people, processes and systems, says Pierre Racz, President, Genetec.
Securing your DNS infrastructure
While DNS infrastructure is inherently a vulnerable component for organisations, effective internal DNS security solutions can turn it into a great asset for securing an organisation’s networks and data.
The challenge of securing IoT
IoT security challenges include weak authentication and authorisation protocols, insecure software, firmware with hard-coded back doors, poorly designed connectivity and communications, and little to no configurability.
How can partners help SMEs fend off cybercriminals?
Hemayun Bazaz, Regional Manager, Channel Sales, Middle East and Turkey at Aruba, a Hewlett Packard Enterprise company, elaborates on how SMEs are a growing target for cybercriminals in the Middle East and why specialisation can help partners be successful here.