Device advice

Mobile is the new endpoint in IT. Getting the job done using mobile devices as you move around has brought in its wake many benefits and improved productivity to organisations in the Middle East. Here is how to protect mobile devices and data.

Under siege

There has been a dramatic increase in cyberattacks on critical infrastructure but regional organisations remain unprepared.

Future perfect

John McCarthy, who coined the term, defined Artificial Intelligence as ‘the science and engineering of making intelligent machines.’ Recently, intelligent machines – their creators, specifically – have taken leaps and bounds when it comes to meeting humans as equals in terms of processing power and the ability to make informed decisions.

Three’s the magic number

Westcon-Comstor is flaunting a range of its security services in its third outing at GISEC. Chief among them are its logistics, cloud and flexible finance solutions.

Inside job

These days, the threat landscape for most companies is massive. But while there is a litany of outside threats that their security teams need to worry about, there is often an even greater danger much closer to home.

Bad behaviour

Companies can spend untold funds on the latest security software, keep their firewalls and security infrastructure up-to-date, monitor networks, and employ the highest level of IT talent all in the name of security. However, it can all be rendered useless by one simple thing – employees choosing to ignore basic regulations.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines