Security shot up the priority list of not just CIOs but also higher management in 2012 as the world witnessed …
Keeping secure? Virtually impossible
The last 12 months has seen an incredible transformation from traditional IT towards a new, digitalised world which has begun …
Security digital identities
In today’s digital world, the identity of users is defined by their digital credentials. The ability to demonstrate their identity, …
Clouded with uncertainty
The migration of enterprise applications to cloud infrastructure is becoming more and more of an inevitability. But whilst private cloud …
A new era
With the advent of the BYOD phenomenon, the amount of threats businesses face have multiplied on an unprecedented scale. Ben …
End to end: The security story
The security landscape is rapidly evolving. We speak to distributors and vendors in the region to learn how they are …
Encryption made easier with new key management tools
In response to dramatic and widely publicized losses of data over the last few years, IT execs are moving to …
I(TS)2 designated as a qualified security assessor for PCI audits certification
IT Security Training & Solutions – I(TS)2, the Middle East’s premier provider of integrated Security Education & Certification Curriculum, Security …
Managing software assets
The current climate of company mergers and downsizing is putting CIOs under pressure to keep the lid on software costs …