Dubai Silicon Oasis and DTEC’s fourth annual Entrepreneur Day opened up with a session that truly caught the eye. That …
On the safe side: Simple steps to online safety
Protecting yourself online may seem impossible, but following simple guidelines like enabling stronger and using strong passwords are key to online safety.
Using IoT devices to launch attacks from within
The number of IP-enabled IoT devices has increased dramatically in the last several years and according to Gartner, it is predicted …
Dimension Data’s top cybersecurity predictions for 2018
Trend 1: ‘Zero trust’ security makes a comeback In 2018, we can expect to see significant disruption in the cybersecurity …
Top tips for effective multi-factor authentication
Kamel Heus, regional manager, MEA, Centrify, shares insights on how organisations can implement a multi-factor authentication to protect corporate data against unauthorised users.
Xennials: the latest micro-generation everyone’s talking about
Dan Woodman, an associate professor of sociology at the University of Melbourne, has curated a new category for those born between 1977 and 1983, which he says are “a combination of the pessimistic Gen X-ers and optimistic millennials.”
The cat and mouse game: AI and machine learning’s role in cybersecurity
As the world swoons over the promise and practice of AI and machine learning, the world of cybersecurity sees both the hero and the villain take part in the game.
iPhone X first impressions
Apple has selected a handful of bloggers and vloggers to review its much-awaited iPhone X. Here’s what they have to say.
The Big Data transformation and the future of consumer experience
Every day we walk into the store, we pause a bit and take a look at the items displayed. Our …
Red Hat’s Basinski: Channel players should invest on vertical specialisations
Frank Basinski, director partner programmes and enablement, EMEA, Red Hat, explains why the channel must focus on becoming adept in specific verticals.
Beyond the appliance: Leveraging threat intelligence for cybersecurity
What underpins the security appliances is invisible, but plays a pivotal role in ensuring that those boxes block the threats that imperil your business.
BlueBorne attack: A closer look at Bluetooth vulnerabilities
In the age of digitisation, it is important to keep abreast with the latest information about the ever changing threat landscape and associated cybersecurity challenges.
Fortifying cybersecurity through compliance
Abdulrahman Alshetwey, CEO, Innovative Solutions, explains how cybersecurity posture can be improved within enterprises. The month of September was an …
Thwarting breaches with managed detection and response
By the time data breaches have run their course, it is often too late. The resulting loss of revenue, reputation, …