Cyber-crime will not stop for Christmas

Threats lurk within networks, endpoints or devices, often hidden in poorly configured settings or permissions, ineffective data governance, access management and usage policies. These unseen threats come from all perimeters of the organisation and major trends such as BYOD, big data, cloud, and mobile apps have increased the challenge faced by IT leaders.

Dell jumps into enterprise mobility management

Dell Software yesterday introduced a suite of software and services for enterprise mobility management, including a ‘secure workspace’ for mobile devices that lets enterprise IT managers separate work from data apps.

Possibility in the privacy pitfalls?

Last month, a former CIA technician leaked information on the National Security Agency’s data gathering surveillance programme dubbed PRISM. Joe Lipscombe investigates what relevance this holds for the Middle East.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines