Despite the cloud’s presence, organisations are only recently starting to understand the level of cloud adoption that is appropriate for …

Despite the cloud’s presence, organisations are only recently starting to understand the level of cloud adoption that is appropriate for …
Haider Salloum, SMB Channel Director, Microsoft Gulf, says partners need to position themselves as trusted advisors to help customers mitigate …
Mohammed Al-Moneer, regional director, A10 Networks MENA, discusses why Middle East telcos should invest in the future and modernise their infrastructures.
Arthur Dell, director, Technology and Service, MEA, Citrix, analyses how technology is providing enhancements in patient care within the region, …
The growing importance of the chief data officer reflects the central role of information in digital business, says Gartner’s research director Alan Duncan.
Struts, the vulnerability recently found in a popular form of software (Apache Struts 2) offered by open source community, “The …
Rishi Bhargava, Co-founder and VP Marketing, Demisto, gives us a lowdown on the latest threat looming in the cyberspace.
Ben Bernstein, CEO, Twistlock, shares six runtime threat detection and response tips for container security.
Marco Pozzoni, EMEIA E-Series Sales Director, NetApp, shares top reasons why Big Data analytics is the heart of the digital transformation.
Nirav Modi, Vice President and General Manager, Blue Planet, discusses key questions to address before making the leap to Software-Defined WAN.
What are the top cybercrime activities businesses need to watch out for, and what can be done to combat them?
By focusing on hardening the physical security systems we have to be sure that we have three elements: people, processes and systems, says Pierre Racz, President, Genetec.
While DNS infrastructure is inherently a vulnerable component for organisations, effective internal DNS security solutions can turn it into a great asset for securing an organisation’s networks and data.
IoT security challenges include weak authentication and authorisation protocols, insecure software, firmware with hard-coded back doors, poorly designed connectivity and communications, and little to no configurability.