Maan Al-Shakarchi, Networking Lead, Europe and AMEA, Avaya, discusses the recent breach experienced by the Bangladesh Central Bank and shares insights on how similar situations could be avoided.

Maan Al-Shakarchi, Networking Lead, Europe and AMEA, Avaya, discusses the recent breach experienced by the Bangladesh Central Bank and shares insights on how similar situations could be avoided.
This is the age of the web. With technology advances in cloud, mobile and social, the paradigm shifts in information management have and are moving fast – to the web. Web-based capture will be a game-changer for growth and survival of organisations in the Middle East. The advantages are huge!
Your employees are undoubtedly bringing their own devices to work, whether or not you have a BYOD policy in place. Rhonda Chicone, Faculty Member, Kaplan School of Business and Information Technology, explains why you should start settling on a BYOD policy now.
Bogged down by legacy systems and stubborn employees, Petroserv’s IT was suffering. The Qatari firm’s Head of IT, Mubarik Hussain, shares his story of how he instigated a complete technology overhaul, and has since reaped the rewards.
In the consumer world, mobility progressed in three general phases: initiation, evolution, and maturity. Although the consumer marketplace is now enjoying the benefits of the maturity stage, the enterprise world is still stuck somewhere between initiation and evolution.
The digital transformation of businesses globally, with emergence of Smart Cities is changing the very definition of security role, from being a technology centric to more of a business-centric executive role, forcing the security leaders to get more involved and be responsible for securing business processes and operational technologies that control Smart Cities and critical infrastructure of a nation.
Cricket Liu, Chief DNS Architect, Infoblox, discusses the potential of passive DNS in protecting network infrastructure.
Over the past half-decade, the Big Data flame has spread like wildfire throughout the enterprise, and the IT department has not been immune. The promise of data-driven initiatives capable of transforming IT from a support function to a profit centre has sparked enormous interest.
Ondrej Krehel, Founder, CTO and Darin Andersen, Founder, CEO, Cyberunited Lifars, speaks about white hat hackers and very fine ethical line they may or may not cross.
Philippe Roggeband, Business Development Manager, Cisco Security Architecture, explains in-depth how organisations can tackle the challenges around Internet of Things (IoT).
Ten years ago, an IT journalist asked Paul Coby, then CIO of British Airways and about to embark on a …
Jyoti Lalchandani, IDC’s Group Vice President and Regional Managing Director for the Middle East, Africa, and Turkey, talks about how the CIO’s role is evolving to become an organisation’s innovation and integration leader.
IT security is a fast moving and exciting field to be in. Fascinating industry news greets me almost every morning.
From popular culture to big business, the geeks have inherited the earth. They are now often championed, given the limelight or even imitated – geek is now chic! So let’s take some time out to look how the geek – and our perception of the geek – has evolved…