Cloud computing in the region is yet immature, and there are several challenges that exist in the region. Nevertheless, there …
Nearly 300,000 Iranian IP addresses likely compromised
Close to 300,000 unique IP addresses from Iran requested access to google.com using a rogue certificate issued by Dutch digital …
Securing parameters
As our society mobilises and more individuals use smart devices to access corporate data, cyber criminals are developing more sophisticated …
Protect yourself from Facejacking
It’s sometimes difficult to believe but our social networking accounts have become, in many cases, a part of our lives …
Virtual blind spot
Malicious hypervisors. Subversive virtual machines. Live migration impersonators. Welcome to the world of virtualisation, where the threats are new and …
Driving innovation
With more organisations making the transition to virtual computing it is time to understand the basis for successful implementation of …
Gmail targeted by phishers
Google has disrupted what it believes to be a targeted phishing campaign aimed at stealing e-mail from government officials, contractors …
Redington to support Fujitsu’s storage and servers
Redington Gulf’s value division has been operational for four years Fujitsu Technology Solutions, a global IT infrastructure provider, and Redington …
Securing the virtualisation journey
This week, CPI and leading security vendor Trend Micro brought together CIOs and IT managers across two verticals – oil …
The truth about malvertisements
Online advertisements are a part of our daily browsing experience as it has also become an essential part of companies’ …
Geared for battle
Sathya Mithra Ashok writes on how Ducab uses a wise mix of security solutions to safeguard device and data. Dubai …
With protests growing, Egypt cuts links to Internet
As protesters continue to clash with police in anti-government demonstrations, Egypt has pulled the plug on the Internet. The cut-off …
Iomega sets new standard for portable hard drives
The new all-USB 3.0 eGo Portable Hard Drives will feature hardware encryption and super toughness, too, thanks to a drop …
Virtual world
Mohammed Thameem Rizvon,Group IT manager, Kamal Osman Jamjoom Have you implemented virtualisation solutions in your enterprise? If so, what …
Unmasking DLP
If you have been following the security technologies landscape, chances are that you have already heard of Data Loss Prevention. …
Making inroads
Kaspersky Lab says the company is growing and is primed to take the number three spot in global market share …
Netgear targets SMBs with new security tool
Netgear's new security appliance takes on small-to-midsize business stalwarts such as Fortinet and Barracuda by including antispam, antimalware, and Web …
A bullish outlook
RWME: What will be Trend Micro’s main channel focus for 2010 in the Middle East region? CM: We will continue …
Cloud security: Try these techniques now
For Logiq³ Inc., the decision to go with a cloud-based provider of IT infrastructure as a service (IaaS) was a …
Cloud security: Try these techniques now
For Logiq³ Inc., the decision to go with a cloud-based provider of IT infrastructure as a service (IaaS) was a …