Easy money

As hackers become more organised, previously challenging targets seem like easy pickings. In the past, a thief would need to take on high-risk behaviour to gain access to the goods. Now, the big payoff may be only a few clicks away.

IoT: Invasive or invaluable?

The Internet of Things is forecast to be a pivotal and pervasive tech trend in the coming years. The power to connect almost any physical object to the Internet could bring huge benefits for the enterprise, but what are its pitfalls? How can Middle Eastern organisations overcome security and privacy concerns to realise the benefits of the IoT?

A suit of armor

As various emerging technologies become popular in business environments, security is a prime concern for organisations. Reseller Middle East explores how partners can make the most of the opportunities present here.

Dell releases new SonicWALL TZ Wireless Firewall Series

Dell has announced the release of the Dell SonicWALL TZ Wireless Firewall Series, a line of wireless network security solutions that enable both SMBs and large distributed enterprises to realise the benefits of enterprise-class 802.11ac wireless performance and security.

Cyber vigilance

Radwan Moussalli, Senior Vice President – Middle East, Central Asia and Africa, Tata Communications, talks about the emerging security concerns in the digital age and how organisations can tackle these threats.

FireEye: Cyber threat group targets Wall Street

FireEye has recently released an intelligence report that assesses that a financially motivated advanced threat group has been carrying out ongoing attacks against publicly traded companies in an attempt to play the stock market.

Dell introduces new series of Wyse thin clients

During the recently held Microsoft Worldwide Partner Conference, Dell unveiled its latest Wyse thin clients, based on Windows 10 IoT Enterprise operating system and updates to its vWorkspace desktop virtualisation software.

Bad behaviour

Companies can spend untold funds on the latest security software, keep their firewalls and security infrastructure up-to-date, monitor networks, and employ the highest level of IT talent all in the name of security. However, it can all be rendered useless by one simple thing – employees choosing to ignore basic regulations.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines