Cybercriminals need less than a week after a critical vulnerability is disclosed to develop and post experimental exploits on the dark web, ready for use in attacks.
“It is encouraging to see criminal activity becoming an ever-shrinking share of the crypto ecosystem” – Eric Jardine, Chainalysis
New research by Chainalysis, the blockchain data company, has shown that while the year to date (YTD) flow of crypto …
As the ‘Age of AI’ beckons, it’s time to get serious about data resilience
Rick Vanover, Vice President of Product Strategy, Veeam, explores the potential and the processes organisations need to consider before powering their data resilience with AI.
“Mobile banking is expected to be worth $1.82 billion by 2026” – Mithil Ajmera, COO of Sav
Mithil Ajmera, Co-Founder and COO of Sav, has penned a thought-leadership article, which highlights the top 10 ways money-management apps …
SANS Institute’s strategy guide reveals key challenges in zero trust implementation
According to a new strategy guide from the SANS Institute, “Navigating the Path to a State of Zero Trust in 2024,” businesses often stumble over key obstacles in their journey towards Zero Trust adoption.
Qualys research shows a sharp rise of 30% in CVEs in 2024
According to new research from the Qualys Threat Research Unit (TRU), between January to mid-July, the CVE count rose by …
“Fiber-to-the-Office is the ideal solution to support digital transformation” – Arafat Yousef, Aginode
Arafat Yousef, Managing Director, Middle East & Africa at Aginode, believes that Fibre To The Office (FTTO) is a forward-looking …
“Only a holistic approach to CX will drive customer loyalty” – Rodolph Khoury, Avaya
Rodolph Khoury, Managing Director – Dubai & Northern Emirates, Avaya, has written a thought leadership article in which he makes …
Taking back IT and security control – Connectivity Cloud
Bashar Bashaireh, Managing Director & Head of Middle East and Türkiye at Cloudflare, discusses the need for a different type of cloud—one that delivers secure, performant, any-to-any connectivity.
Lessons from the global Windows outage
The massive, worldwide outage of Windows computers caused by a bug in CrowdStrike software underscores a lesson we should all take to heart: You shouldn’t run critical network services (such as DNS and DHCP) on Windows Servers.
“The question for enterprises today isn’t whether to adopt observability, but how to deploy it” – Jeff Stewart – SolarWinds
Jeff Stewart, VP of Product at SolarWinds, has penned an op-ed, which examines how IT leaders need to optimise observability …
“Despite its challenges, open source is more relevant now than it has ever been” – Jonathan Marsh, WSO2
Jonathan Marsh – Vice President, Strategy at WSO2 has penned an op-ed that takes a much closer look at Open …
Pure Storage CTO outlines best practices to deal with the complexities of storage management
Fred Lherault, Field CTO, EMEA Emerging at Pure Storage, has penned a thought leadership article that examines the continued evolution …
Sophos unveils how ransomware groups weaponise stolen data
Ransomware Groups Weaponize Stolen Data to Increase Pressure on Targets Who Refuse to Pay.