Securing parameters

As our society mobilises and more individuals use smart devices to access corporate data, cyber criminals are developing more sophisticated …

Virtual blind spot

Malicious hypervisors. Subversive virtual machines. Live migration impersonators. Welcome to the world of virtualisation, where the threats are new and …

Driving innovation

With more organisations making the transition to virtual computing it is time to understand the basis for successful implementation of …

Gmail targeted by phishers

Google has disrupted what it believes to be a targeted phishing campaign aimed at stealing e-mail from government officials, contractors …

Virtual world

  Mohammed Thameem Rizvon,Group IT manager, Kamal Osman Jamjoom Have you implemented virtualisation solutions in your enterprise? If so, what …

Unmasking DLP

If you have been following the security technologies landscape, chances are that you have already heard of Data Loss Prevention. …

Making inroads

Kaspersky Lab says the company is growing and is primed to take the number three spot in global market share …

A bullish outlook

RWME: What will be Trend Micro’s main channel focus for 2010 in the Middle East region? CM: We will continue …

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines