Clinton Firth, MENA Cyber Leader, EY Africa, India and Middle East (AIM), on how organisations can build resilient systems to protect themselves against cyber threat actors.
Citrix’ 2016 Global Desktop-as-a-Service Market Report reveals that 70 percent of its service providers anticipate increased DaaS revenues in this year. Director for Technology Sales and Services, MEA, Arthur Dell, shares more highlights.
Bruce Zhou, CEO, Axilspot, explains how partners can overcome the challenges of IoT and the Internet worlds integrating.
Tarek Jundi, Managing Director, Middle East and North Africa, Intel Security, elaborates on the factors required to be a successful managed security service provider.
Developers are decoupling massive system architectures into small, independent functions that loosely work together to solve complex problems.
Having seen first-hand the damage that can be caused by malicious IoT devices during the Dyn attack in October, organisations must now consider what can be done to keep these clever things from causing harm.
Nick Jones, Vice President, Gartner, outlines how CIOs should be considering product development, team building, and digital ethics of IoT within the connected home.
Data is, unfortunately, growing faster than our ability to make use of it. Will 2017 be the year of data literacy?
Mohammed Abukhater, Regional Director, Middle East and North Africa, FireEye, discusses the risks brought by insider threats and what it means for your business.
Harish Chib, Vice President Middle East and Africa, Sophos, explains how channel partners can play a critical role in easing security pains for CSOs and help achieve synchronised security.
EMC’s senior director of converged infrastructure, Brad Maltz, explains why enterprises are opting for converged infrastructure solutions.
Ben Savage, EMEA Head of Channels and Alliances, Pure Storage, on why all-flash storage is transforming partner programmes.
Click fraud is more than just a marketing problem. It presents a real security risk to your organisation, experts say. CIOs need to know their enemy.
In May this year, we posted results of our ‘network protection survey’, which looked – among other things – at best practices in companies that were highly successful at network security.