The Way Forward

When it comes to security, it seems everyone’s in a state of perpetual panic. Whether it’s mobile malware, BYOD or hacktivism, over the course of 2013 the issue of protecting valuable information and resisting attack has inspired a dizzying and persistent challenge.

Insight: top signs that you’ve been breached

Because data is often the most valuable corporate asset – especially when customer information is concerned – staying alert for potential compromise is a critical IT job. Unfortunately, looking into a potential data breach is not easy.

Simplifying security

Conventional wisdom says that simple security is an oxymoron. Good security is complex, while uncomplicated security is weak. Whenever security …

Selling to SMBs

Small and Medium Businesses (SMBs) represent an important element in the business ecosystem of the Middle East. Industry analysts predict …

Eye of the storm

Experts recently pointed towards security as the main obstacle for adoption of all cloud types and claimed that cloud security …

HP outlines Big Data Security strategy

HP on Monday unveiled its Big Data Security strategy, describing how combining the enterprise search and knowledge management resources from its Autonomy subsidiary …

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines