To make VAT compliance a reality but not a headache, companies must leverage IT solutions that store and manage sensitive information.


To make VAT compliance a reality but not a headache, companies must leverage IT solutions that store and manage sensitive information.

Technology has brought everything to the fingertips of the users. Today, the most prominent form of artificial intelligence that touches …

A key figure behind one of the Middle East’s shining Blockchain success stories has said that feverish excitement around the …

Technology has innumerable benefits for business. The explosive growth of devices, applications and networks have not only changed our personal lives, but our working lives too.

According to a recent research report from PwC, artificial intelligence is expected to account for approximately 13.6% of the United …

Last year, Forrester noted that, “The honeymoon for enterprises naively celebrating the cure-all promises of artificial intelligence technologies is over… …

Whether it is caused by cataclysmic weather, technological malfunctions or human actions, an IT outage can be devastating.

Ashraf Sheet, regional director, Middle East and Africa, Infoblox, discusses why threat intelligence sharing is key to staying cyber-resilient in the connected era.

Alain Penel, regional vice president, Middle East, Fortinet, advises partners to take advantage of the opportunities that help customers reassess …

Alain Penel, regional vice president, Middle East, Fortinet, advises partners to take advantage of the opportunities that help customers reassess …

The Middle East telecom sector is booming with opportunities for operators to transform their revenue models through the introduction of …

Necip Ozyucel, Cloud & Enterprise Group Lead, Microsoft Gulf discusses the stark indicators that suggest we are not averse to letting the digital realm play a central role in the maintenance of our health.

By 2019, all digitally transformed organisations will generate at least 45% of their revenue from new business models. And as …

Phishing is one of the most common attack vectors for hackers who exploit end-user behaviour as the weakest link in an organisations cyber-defense.