Let’s encrypt and decrypt

Paul Nicholson, Director, Product Marketing, A10 Networks, discusses why organisations need a dedicated SSL inspection platform to eliminate potential blind spots in their respective cyber defences.

Armed for the IoT revolution

Jack Waters, CTO, Level 3 Communications, discusses three network adjustments organisations should undertake for a smooth and secure transition towards …

Securing the bridge

Cloud storage revenue is forecast to grow more than 28 percent annually to reach $65 billion in 2020. The driving force is the substantial economies of scale that enable cloud-based solutions to deliver more cost-effective primary and backup storage than on-premise systems can ever hope to achieve.

Offensive security

Carolyn Crandall, CMO, Attivo Networks, discusses how security teams can gain the upper hand by going on the offense and creating an environment that provides continuous real-time detection against an ever-changing landscape of cyber threats.

Business enabler

Sachin Bhardwaj, Director Marketing and Business Development, eHosting DataFort, explains how the Internet of Things will increase the demand for cloud and managed IT services in the Middle East.

Seamless capture

Kodak Alaris Worldwide Category Director for Capture Solutions Emma Isechei discusses how the company’s Info Input solution can help businesses reduce costs and improve productivity.

Mobile moments

In the consumer world, mobility progressed in three general phases: initiation, evolution, and maturity. Although the consumer marketplace is now enjoying the benefits of the maturity stage, the enterprise world is still stuck somewhere between initiation and evolution.

Fighting cyberwarfare

Kasey Cross, Sr. Product Marketing Manager at A10 Networks, discusses how government entities can fend off state-sponsored cyber attacks.

Next-gen cybersecurity leaders

The digital transformation of businesses globally, with emergence of Smart Cities is changing the very definition of security role, from being a technology centric to more of a business-centric executive role, forcing the security leaders to get more involved and be responsible for securing business processes and operational technologies that control Smart Cities and critical infrastructure of a nation.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines