Whether employees of a company are working in a hybrid working environment, working from home, from a remote location, using a mobile device, or at the office premises itself, strong and proven encryption solutions for data should be adopted, and this applies to both data at rest and data in motion for small, medium and large-scale organisations.
Excessive technology use to blame for child obesity in UAE, Saudi Arabia
Nine in 10 children across UAE and KSA have access to tablets, smartphones or other handheld electronic devices with screens.1 3447Kaspersky manager discusses the role of women in security
Alaina Huysamen, Marketing Manager for Africa at Kaspersky, spoke with Security Advisor ME & Tahawultech.com about the evolving role of women in security technologies.
ManageEngine to host its 11th Middle East User Conference in Dubai
Company to launch security and risk posture management in its SIEM solution at the event.
emt Distribution partners with STORViX
The primary motivation behind this agreement is to expand the reach of our mission: to challenge the status quo of the data storage industry by making it sustainable, simple, and secure.
The Crucial DDR5 delivers for evolving computing needs
Crucial DDR5 Memory has the blazing speed and massive bandwidth needed for the next generation of multi-core CPUs.
Endava research reveals emerging tech trends, concepts, and initiatives
In 2023, most businesses are focusing on tech like Big Data and AI-Driven Automation which have proven use cases, while few are pursuing strategies around the Metaverse
SANS to enhance regional security awareness with SANS Dubai February 2023
The world-leading cybersecurity training provider will also be present at the Gartner Security & Risk Management Summit in Dubai from 27-28 February 2023.
The state of hybrid cloud application delivery
A10 Networks and Gatepoint Research conducted a survey asking senior technology decision-makers about their experiences delivering applications in the cloud, including where their applications are primarily hosted; how they use their application delivery controller (ADC), and whether they’re satisfied with it; and what application delivery capabilities they need to ensure that their business objectives are successful.
ESET launches ESET Cyber Security for macOS v7.3
Each component of ESET Cyber Security for macOS starts only when needed and runs for its allotted time, after which it is automatically deactivated, helping to save on device resources.
Qualys expands cloud platform to reduce enterprise risk
Introducing value-based, all-inclusive cybersecurity packages that include patch management and EDR to protect small and medium businesses from cyber threats.