Sam Tayan, Head of METAP at Zoom explains how interpersonal interactions, workflows, and communication channels between workers, teams, and customers …

Sam Tayan, Head of METAP at Zoom explains how interpersonal interactions, workflows, and communication channels between workers, teams, and customers …
Gaurav Mohan, VP, SAARC & Middle East, NETSCOUT highlights that to become an unstoppable enterprise, organizations must consider five essential …
Chady Smayra and Diana Dib, partners with Strategy & Middle East, part of the PwC network, discuss how the GCC …
Ramy Sfeir, Partner, Sami Darouni, senior executive advisor, Nitin Manoharan, executive advisor, and Makram Debbas, principal, with Strategy& Middle East, …
While creating a data strategy might be challenging, it is crucial for Middle Eastern businesses looking to expand and remain competitive.
Enterprise organisations’ daily dependence on technology is not only all-encompassing, but also growing deeper and even more fundamental to its operations. There is no way of slowing this continuing digital transformation.
GCG Enterprise Solutions’ Waleed Alawadi reflects on the inevitable trend shaping the future.
Gregg Ostrowski, CTO Advisor at Cisco AppDynamics, discusses the technology organizations need to optimize application availability and performance, why IT …
Saeed Ahmad, Managing Director Middle East and North Africa at Callsign, outlines what the metaverse means for our digital identities …
As the Middle East makes a concerted effort to grow its knowledge and skills-based economy, the role of data in driving innovation, transformation and success cannot be overstated.
Instead, let us consider technology that does not rely on detection but follows zero-trust principles and assumes all files are malicious. This method works by first verifying a file’s type and identifying any embedded content. It removes any content it considers to be potentially malicious and reconstructs the file using only legitimate components. We call this sanitisation method “content disarm and reconstruction”, or CDR.
Raviteja Dodda, CEO & Co-Founder at MoEngage highlights how businesses are increasingly turning to AI to improve efficiency, empower employees, …
Cloud service providers now recognise their responsibility for security lies around their infrastructure and services provided for enterprises says Tamer Odeh, Regional Sales Director, from SentinelOne.
Better Visibility Into IT Environments Can Help Companies Go Green and Improve Remote Work Experiences.