Necip Ozyucel, Cloud & Enterprise Group Lead, Microsoft Gulf discusses the stark indicators that suggest we are not averse to letting the digital realm play a central role in the maintenance of our health.
By 2019, all digitally transformed organisations will generate at least 45% of their revenue from new business models. And as …
Phishing is one of the most common attack vectors for hackers who exploit end-user behaviour as the weakest link in an organisations cyber-defense.
CISOs must evolve the talent strategy to reflect the changing roles, competencies and skill sets to address digital risk.
The future classroom is well-connected with professors utilising Wi-Fi to their advantage to create an interactive learning experience. As we prepare for this shift, we look at some mistakes that must be avoided.
SAM, as we define it, is the people, process, and technology necessary for the effective management, control, and protection of the software assets and investments throughout all stages of the software lifecycle.
Data exists everywhere – generated by seemingly every “thing.” And we’re just getting started, it’s what I’ve been calling “Lots of Data Everywhere,” or L.O.D.E. – perhaps the “Mother LODE.”
There has been so much noise recently regarding the cloud that it’s sometimes hard to decipher what is important and what is extraneous.
The digital platform economy is constantly transforming the way we work and interact.
In recent months, the UAE has carved out its place on the global e-commerce map – and quite deliberately so. In October 2017, for example, the Dubai Airport Free Zone launched Dubai CommerCity.
In this dynamic business world, IT needs to mature from just a business enabler to role of business transformer, where it will clearly set the company apart from the competition.
Anthony O’Mara, vice president, EMEA, Malwarebytes, sheds light on a new malware that’s on the rise and why having a multi-layered security approach is key to thwarting this threat.
Michel Nader, Regional Director, Data Protection Solutions, Middle East, Turkey and Africa (META Region), Dell EMC, shares insights on the critical strategies needed for protecting data.
In order to be maximally effective, it remains important for businesses to optimise IT, so that employees have to spend less time on IT processes that are not part of their core tasks, says Taj El-Khayat, regional director, Citrix for Middle East and North Africa (MENA)