As the automotive industry moves towards a future of connected and autonomous vehicles, ensuring robust cybersecurity is of paramount importance. …

As the automotive industry moves towards a future of connected and autonomous vehicles, ensuring robust cybersecurity is of paramount importance. …
Ransomware is the only form of cryptocurrency-related crime that has grown in 2023, with attackers on pace for their second-biggest year ever.
In an exclusive op-ed for tahawultech.com, Avaya’s Rany Tannouri, outlines how government departments up and down the country are making …
Video live agents empower businesses to establish direct and personalised connections with their customers. In contrast to traditional customer care methods characterised by lengthy waiting periods and impersonal interactions, video live agents facilitate real-time face-to-face communication.
Alex McMullan, CTO International at Pure Storage, has outlined the need for CTOs and CIOs to strike the right balance …
Kaspersky unveils a comprehensive report highlighting the increasing peril faced by small and medium-sized businesses (SMBs) in the current cyberthreat landscape.
Large Enterprise CIOs Are Using Several Tactics to Execute Their Talent Strategy and Meet Critical Skills Demands in 2023.
Edwin Weijdema, Field CTO EMEA and Lead Cybersecurity Technologist at Veeam, said that businesses simply have to learn to live …
BPM works in combination with ECM that enables the automation of various activities such as accounts payable, contract management, content management, information security and governance.
Adrian Taylor, VP EMEA at A10 Networks, has penned an exclusive op-ed that highlights the issues facing commercial data centre …
Kinda Baydoun, Head of Channel & Alliances – Middle East & CIS at Veeam, has penned a thought leadership article …
A recent study from Duke University found a stunning 85% of surveyed midsize companies across sectors reported their systems had been successfully penetrated at some point, despite many of these organisations potentially following long-established best practices.
Proper configurations of a security solution are crucial to prevent it from disabling or even abusing it – a tactic often seen to be employed by APT groups/actors.
Each scenario demonstrates the cybersecurity’s true role in terms of business continuity and profitability, highlighting emerging challenges and threats.