Nortel Networks has entered into an agreement with Nokia Siemens Networks to sell its its wireless network infrastructure business assets …
Report: Nokia Siemens bids for much of Nortel
Nokia Siemens Networks, Avaya and Siemens Enterprise Communications are moving in to buy parts of troubled Nortel Networks, the Wall …
Siemens launches cloud experiment at VoiceCon
Siemens is announcing at VoiceCon Orlando a unified-communications-in-the-cloud experiment with Amazon.com, which could result in services that avoid capital costs …
Fujitsu Siemens debuts ‘zero-watt’ green PC
Fujitsu Siemens Computers plans to launch in the middle of this year an enterprise desktop computer that consumes no energy …
Siemon launches Z-MAX network cabling solution
Siemon introduce the new Z-MAX end-to-end network cabling solution, designed from the ground up at Siemon Labs to shatter the …
Fujitsu Siemens plans ‘zero power standby’ PC
PC maker Fujitsu Siemens is planning a new range of 'green' PCs that draw zero power while on standby, effectively …
Fujitsu to acquire Siemens’ stake in PC venture
In a widely anticipated move, Fujitsu has agreed to acquire Siemens' stake in their European computer joint-venture, Fujitsu-Siemens Computers, the …
The significance of green data centres to counter the AI explosion
Ehab Kanary, VP, Enterprise Infrastructure, EMEA Emerging Markets, CommScope, discusses the transformative impact of AI technology on data centre construction and operations, particularly in driving the adoption of green data centres.
LinkShadow is positioned as a representative vendor in the 2024 Gartner Market Guide
LinkShadow is positioned as a Representative Vendor in the 2024 Gartner® Market Guide for Network Detection and Response.
Positive Technologies discovers new APT group targeting governments: Lazy Koala
Positive Technologies detects a series of cyberattacks against government organisations in Russia and the CIS.
Fortinet introduces expansive upgrades to its real-time network security operating system
The latest version of FortiOS, the only operating system that seamlessly converges networking and security, and Security Fabric updates deliver new generative AI, data protection, managed services, and unified agent features.
World’s Largest Bug Bounty – $650,000 Offered to Fortify Cybersecurity Standards on a Global Scale
World’s largest bug bounty: Positive Technologies offers bug hunters over $650,000 for stealing money or injecting backdoors into the code of its own products.
Five reasons why security professionals should use packet data
Emad Fahmy is currently the Systems Engineering Manager at NETSCOUT. In this op-ed he discusses how packet data can support the crucial task of protecting digital landscapes from cybersecurity threats.
Positive Technologies helps fix critical vulnerability for popular videoconferencing service Yealink
Yealink has thanked Positive Technologies for discovering the critical vulnerability BDU:2024-00482 in its Yealink Meeting Server videoconferencing system.
CirrusLabs believe their unique digital framework can enable companies to transform
Naeem Hussain, Chief Operating Officer at CirrusLabs, tells CNME Editor Mark Forker, how the ‘niche’ digital transformation provider plans to …
Allied Telesis: Optimising Wireless Technology
Shaheen APM, Solutions Manager, Middle East and Africa at Allied Telesis tells Anita Joseph how the company, a leading provider …
Kaspersky Container Security launched at GITEX 2023
Kaspersky launches specialised security solution for containerised environments.
Optimising Wireless Technology
Shaheen APM, Solutions Manager, Middle East and Africa at Allied Telesis tells Anita Joseph how the company, a leading provider of hardware and software products, is redefining enterprise networking with the first-of-its-kind hybrid wireless LAN solution that maximises both mobility and bandwidth.
Eros Group debuts cutting-edge cleaning technology products
In addition to its advanced cleaning capabilities, all its vacuum cleaners are designed to be highly durable and long-lasting, with a robust construction that can withstand the rigors of everyday use. It is also energy-efficient that consumes minimal energy while delivering maximum cleaning power.
83% of successful cyberattacks in the Middle East had a targeted nature
Attacks on Middle Eastern government agencies are mainly carried out by APT groups (56%), covertly establishing themselves in the victim’s infrastructure for the purpose of cyberespionage.