Nader Paslar, Head of Digital Transformation at GBS, has penned an exclusive thought leadership op-ed on how low-code solutions can …
Navigating the ransomware storm
Ransomware attacks are on the rise, becoming not only more frequent but also more destructive. Rick Vanover, Senior Director, Product …
5 signs your clients need a cybersecurity makeover
In today’s digital age, re-evaluating networks and cybersecurity operations is essential, particularly in the UAE, where the threat landscape is rapidly evolving.
Middle East banks can balance both security and personalisation with behavioural authentication
It is clear that to please the younger generation of banking customers, institutions must move away from user-driven CIAM systems towards the less invasive DBA.
Good Governance: The last hurdle to unlocking the full value of low-code
Low-code development’s potential to add value up and down the value chain, across departments, and all at every rung of the enterprise is clear.
The five must-haves of an effective application observability solution
The bottom line is that organisations need an application observability solution which meets the current and future needs of all technologists, enabling them to accelerate innovation and deliver seamless and engaging digital experiences to both the organisation and external customers.
Elevating supplier relationship management in the UAE through data analytics
Integration of data analytics into Supplier Relationship Management (SRM) is crucial for optimising supplier relationships, streamlining operations, reducing costs, and promoting sustainable growth.
Heriot-Watt academic discusses Telecommunications and 5G
Stephen Gill, Academic Head of the School of Mathematical and Computer Sciences, Heriot-Watt University Dubai, outline the contributions of the telecommunications and 5G industry in the UAE.
Getting real about AI in the enterprise
Our use of AI is a competitive differentiator, and we’re not alone in keeping it under wraps.
Cloud breach surge: AI Cloud defense vital for GCC enterprises
Taj El-khayat, Area VP, South EMEA, Vectra AI reveals GCC’s $7.45M ransomware impact overshadows global averages, fueling demand for AI-powered …
How to harness the power of Digital Identities
As new solutions continue to emerge, enterprises, employers, and governments need to find ways to maintain high-quality security and convenience with their users.
AI is here: How should CISOs respond?
To stay competitive, it’s essential for organisations to adopt AI technology while safeguarding against potential risks. By taking these steps now, companies can ensure they’re able to reap the full benefits of AI while minimising exposure.
Why CISO burnout is a growing threat to organisations in the UAE
Many believe they can tolerate the stress of the role; however, burnout in the form of chest pains or panic attacks is very real. Burnout happens suddenly when an often-inconsequential event becomes the step too far, causing a catastrophic breakdown.
The evolution of initial access brokers and mitigating strategies
Layale Hachem, senior solutions engineer at BeyondTrust explains how businesses can defend against IABs by enforcing least privilege, enhancing multi-factor …