John Shier, senior security advisor, Sophos, urges customers to stay alert during the mega shopping sale over the next few …

John Shier, senior security advisor, Sophos, urges customers to stay alert during the mega shopping sale over the next few …
Over this weekend, I’d the opportunity to chair the first meeting of CIO MENA Forum, a small group of powerful …
The number of IP-enabled IoT devices has increased dramatically in the last several years and according to Gartner, it is predicted …
Dan Woodman, an associate professor of sociology at the University of Melbourne, has curated a new category for those born between 1977 and 1983, which he says are “a combination of the pessimistic Gen X-ers and optimistic millennials.”
Apple has selected a handful of bloggers and vloggers to review its much-awaited iPhone X. Here’s what they have to say.
Every day we walk into the store, we pause a bit and take a look at the items displayed. Our …
What underpins the security appliances is invisible, but plays a pivotal role in ensuring that those boxes block the threats that imperil your business.
In the age of digitisation, it is important to keep abreast with the latest information about the ever changing threat landscape and associated cybersecurity challenges.
Abdulrahman Alshetwey, CEO, Innovative Solutions, explains how cybersecurity posture can be improved within enterprises. The month of September was an …
By the time data breaches have run their course, it is often too late. The resulting loss of revenue, reputation, …
The big day is nearly upon us. After many months of rumors, we’re finally going to get a look at Apple’s next-generation iPhone. Here are eight things to be excited about the event.
Aaron White, regional director, Sage Middle East, explains the implications of VAT being implemented in the UAE in 2018. On 1 …
The Middle East’s shift to digital business has created a dilemma for the regions CIOs. They need to innovate and implement change, while also retaining levels of control and management.
Most of the cyber-attack maps online today are just ‘eye candy,’ but there are some creative ways they can be used.