Technology has innumerable benefits for business. The explosive growth of devices, applications and networks have not only changed our personal lives, but our working lives too.
How AI will really impact UAE jobs
According to a recent research report from PwC, artificial intelligence is expected to account for approximately 13.6% of the United …
Artificial Intelligence: is the honeymoon over?
Last year, Forrester noted that, “The honeymoon for enterprises naively celebrating the cure-all promises of artificial intelligence technologies is over… …
Disaster Recovery 2.0: protecting businesses from catastrophic risks
Whether it is caused by cataclysmic weather, technological malfunctions or human actions, an IT outage can be devastating.
Strength in unity: why threat intelligence sharing is key to cyber resilience
Ashraf Sheet, regional director, Middle East and Africa, Infoblox, discusses why threat intelligence sharing is key to staying cyber-resilient in the connected era.
How to reassess security postures
Alain Penel, regional vice president, Middle East, Fortinet, advises partners to take advantage of the opportunities that help customers reassess …
How partners can win customers’ trust
Alain Penel, regional vice president, Middle East, Fortinet, advises partners to take advantage of the opportunities that help customers reassess …
Linking the Middle East telecom sector
The Middle East telecom sector is booming with opportunities for operators to transform their revenue models through the introduction of …
Digital docs: GCC healthcare’s embrace of AI physicians
Necip Ozyucel, Cloud & Enterprise Group Lead, Microsoft Gulf discusses the stark indicators that suggest we are not averse to letting the digital realm play a central role in the maintenance of our health.
Digital disruption: Innovation for the customer’s sake
By 2019, all digitally transformed organisations will generate at least 45% of their revenue from new business models. And as …
Something Phishy: how to identify and avoid phishing scams
Phishing is one of the most common attack vectors for hackers who exploit end-user behaviour as the weakest link in an organisations cyber-defense.
Five security roles to plan for in the digital era
CISOs must evolve the talent strategy to reflect the changing roles, competencies and skill sets to address digital risk.
Five Wi-Fi mistakes in the connected classroom
The future classroom is well-connected with professors utilising Wi-Fi to their advantage to create an interactive learning experience. As we prepare for this shift, we look at some mistakes that must be avoided.
SoftwareONE: Why does SAM stumble in the dark
SAM, as we define it, is the people, process, and technology necessary for the effective management, control, and protection of the software assets and investments throughout all stages of the software lifecycle.