Dan Kogan, VP of Product, FlashArray at Pure Storage, has penned an exclusive op-ed for June’s edition of CNME in which he outlines how companies need to adopt a multi-cloud strategy to strive and thrive in the digital economy.

Dan Kogan, VP of Product, FlashArray at Pure Storage, has penned an exclusive op-ed for June’s edition of CNME in which he outlines how companies need to adopt a multi-cloud strategy to strive and thrive in the digital economy.
Prevention and Preparedness Revisited: Cyber Defence After Kaseya Ransomware Attack.
Data democracy: What’s preventing it and how to achieve it.
The benefits of Wi-Fi 6E are clear and, alongside other important networking advancements, it is set to enable businesses to become more connected than ever before. It’s time for businesses to wave goodbye to sluggish connections and poor user experiences and replace them with powerful, high-speed networks. However, it’s critical that they make the right choice for them.
Jiawei Liu, CEO of Huawei UAE, has penned an exclusive op-ed for June’s edition of CNME, in which he outlines how enterprises can tap into and unlock the incredible potential of the Fourth Industrial Revolution.
David Noël, Regional Vice President, Southern Europe, Middle East & Africa at AppDynamics, has highlighted the need to protect technologists as digital transformation continues to ramp up across the region.
Mark Nutt, Senior VP EMEA at Veritas Technologies, examines how businesses can mitigate ransomware and inside threats in an exclusive op-ed for June’s edition of CNME.
Customer Experience Defines the Next Era of Technology.
Intel is Foundational to Unleashing the Possibilities of 5G.
The pandemic brought into sharp focus what many businesses knew already; they were comfortable with business as usual and keeping the lights on, but were not equipped to respond to the challenges of implementing broad organisational change, quickly and without a roadmap. Despite this, organisations everywhere stepped up to the plate and adapted their business models to respond to the needs of their customers.
The most successful businesses continuously assess their own performance to evaluate and introduce different ways to optimise their operations, whilst retaining a high standard of service excellence.
It’s important for IT teams to understand all the risks as their companies take on more flexible working arrangements in the new future. A huge part of this is of course understanding the risks that come with using personal devices, particularly in the process of discarding them or sending them to a new home.
Now that multi-cloud and hybrid workplaces are adding multiple layers of complexity to technology stacks, security teams can be overwhelmed with alerts. By thoroughly profiling every element of the network and applying some basic automation, threat hunters can compile a more manageable to-do list – one that ensures clarity and purpose. Some items may be quick wins, such as simple software patching or reconfiguration. Others may be more complex but require immediate action because of the potential harm they could cause. And others may be trivial and can be ignored.
IDC study reveals the value of Red Hat Certification.