Hardware-encrypted USB drives and cyber threats facing banking and financial sector.
Smishing vs. Phishing: Understanding the Differences
Smishing vs. Phishing: Understanding the Differences.
Opinion: Meeting the new challenges of EnemyBot head-on
Maher Jadallah, Senior Director Middle East & North Africa at Tenable Botnets first gained widespread notoriety in the early 2000s …
Understanding why digital transformation projects fail and how to keep them moving
Understanding why digital transformation projects fail and how to keep them moving.
SMBs & digital transformation
Mohamed Sabra, SMB Lead, Middle East and Africa at Cisco, tells Anita Joseph how small & medium-sized businesses can successfully navigate the nuances of hybrid work.
Feature: International Women in Cybersecurity Day
International Women in Cyber Day (IWCD) began as an occasion to provide support and recognition for women in cybersecurity. Today, …
Newton’s laws of motion: a reflection of today’s IT security landscape
BCG Op-ed: A reflection of today’s IT security landscape.
Middle East Manufacturing & Technology Expo (MEMT), September 12 -14
Mr. Khalifa Al Qubaisi, Chief Commercial Officer of Abu Dhabi National Exhibitions Company (ADNEC).
Improving Digital Experiences with Journey Orchestration
Genesys Op-Ed: Improving Digital Experiences with Journey Orchestration.
Communication service providers must improve and personalise experiences to stay competitive
Communication service providers must improve and personalise experiences to stay competitive.
Data combined with analytics is power for all
Alteryx, Data combined with analytics is power for all.
GIGABYTE R282-Z90 the dependable, versatile storage solution
GIGABYTE’s R282-Z90 is a 2U general purpose rack mount server for mainstream computing and HPC workloads, virtualisation (certified by VMware …
The Next Wave of Ransomware
(Veeam Software): The Next Wave of Ransomware.
Staying safe online: How to browse the web securely
Staying safe online: How to browse the web securely.