Security made simple

Harish Chib, VP-MEA, Sophos, tells us why synchronised security, which enables endpoints and network security components to directly share information, will revolutionise threat detection.

Symantec reveals big shift in UAE cybercrime

According to Symantec’s Internet Security Threat Report (ISTR), Volume 21, cybercriminals are now adopting corporate best practices and establishing professional businesses in order to increase the efficiency of their attacks against enterprises and consumers.

Hybrid ops

Hybrid cloud implementations are becoming standard for companies building next-generation cloud applications. Here are three key questions that need to be considered to be able to run and manage database operations that support both environments.

BYOD is here to stay

Your employees are undoubtedly bringing their own devices to work, whether or not you have a BYOD policy in place. Rhonda Chicone, Faculty Member, Kaplan School of Business and Information Technology, explains why you should start settling on a BYOD policy now.

Evolving rules of security

Harish Chib, Vice President Middle East and Africa, Sophos, shares insights on the way channel business in network and IT security is set to develop in the era of third platform technologies.

Future perfect

John McCarthy, who coined the term, defined Artificial Intelligence as ‘the science and engineering of making intelligent machines.’ Recently, intelligent machines – their creators, specifically – have taken leaps and bounds when it comes to meeting humans as equals in terms of processing power and the ability to make informed decisions.

Infoblox releases DNS Threat Index

Infoblox has announced the Infoblox DNS Threat Index, which measures the creation of malicious Domain Name System (DNS) infrastructure, unexpectedly rebounded to near record levels in the fourth quarter of 2015.

Security the Internet of Things

Gartner researchers predict that by 2020 we will have 25 billion connected devices. However, numerous devices still lack the fundamental security safeguards. How can you secure connected devices before it’s too late?

New opportunities

As a first-time participant at GISEC, AccessData aims to use the event as a platform to showcase its key capabilities in the security space and connect with potential customers.

The power of three

Help AG saw the benefit of attending a ‘security focused’ technology event right from the onset. Managing Director Stephan Berner identifies three primary focus areas for the company’s participation at this year’s GISEC.

Resilient networks

Adrian Pickering, Vice President, Middle East and Africa, Juniper Networks, gives us a lowdown on their participation at this year’s GISEC and shares his thoughts about the current situation of the security landscape.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines