Most of the cyber-attack maps online today are just ‘eye candy,’ but there are some creative ways they can be used.

Most of the cyber-attack maps online today are just ‘eye candy,’ but there are some creative ways they can be used.
Submarine networks are critically important to global communications and when there’s no ‘Plan B’, innovation and constant transformation is a …
Following Microsoft’s latest announcement on the Fall Creators updates, Tahawul Tech takes a look at what we can expect in the next wave of Windows 10 innovations.
Late on 27 June, the New York Times reported that a number of Ukrainian banks and Ukrenergo, the Ukrainian state …
Jimmy Graham, Director of Product Management, Qualys, dissects the latest cyber extortion campaign and lists out the steps to stay …
Gary Davis, Chief Consumer Security Evangelist at McAfee, spells out the steps to fight ransomware such as NotPetya and WannaCry. …
Srinivasan C.R, Senior Vice President, Global Product Management & Data Centre Services at Tata Communications, on how to adapt security …
Software-defined networking (SDN) opens up closed network platforms, allowing for greater oversight and more rapid provisioning of new services, writes …
Luc Serviant, VP of Orange Business Services and a member of the Accelerator Selection Committee of the new Dubai Smart …
David Whitton, General Manager of Kodak Alaris – Eastern Cluster, on why smarter data enables better patient outcomes and reduces costs for healthcare providers.
Apple has confirmed that users will be able to live-stream the keynote for the Worldwide Developers Conference.
A serious security incident is a question of “when,” not “if”, says Rob McMillan, Research Director at Gartner. The 2014 cyber attack on …
Biju Bhaskaran, Presales Manager, Alpha Data, encourages regional enterprises to deploy advanced protection at the endpoint level to stay ahead …
Alex Bennett, technical writer, Firebrand Training, explains why ethical hackers hold the top job in 2017.