The growing importance of the chief data officer reflects the central role of information in digital business, says Gartner’s research director Alan Duncan.
What Apache vulnerabilities really mean
Struts, the vulnerability recently found in a popular form of software (Apache Struts 2) offered by open source community, “The …
Let’s talk about doxware
Rishi Bhargava, Co-founder and VP Marketing, Demisto, gives us a lowdown on the latest threat looming in the cyberspace.
Detecting threats in real-time
Ben Bernstein, CEO, Twistlock, shares six runtime threat detection and response tips for container security.
Big Data – the heart of the digital transformation
Marco Pozzoni, EMEIA E-Series Sales Director, NetApp, shares top reasons why Big Data analytics is the heart of the digital transformation.
Key questions to ask before making the leap to SD-WAN
Nirav Modi, Vice President and General Manager, Blue Planet, discusses key questions to address before making the leap to Software-Defined WAN.
Best practices in dealing with cybercrime
What are the top cybercrime activities businesses need to watch out for, and what can be done to combat them?
A look ahead for the security industry
By focusing on hardening the physical security systems we have to be sure that we have three elements: people, processes and systems, says Pierre Racz, President, Genetec.
Securing your DNS infrastructure
While DNS infrastructure is inherently a vulnerable component for organisations, effective internal DNS security solutions can turn it into a great asset for securing an organisation’s networks and data.
The challenge of securing IoT
IoT security challenges include weak authentication and authorisation protocols, insecure software, firmware with hard-coded back doors, poorly designed connectivity and communications, and little to no configurability.
How can partners help SMEs fend off cybercriminals?
Hemayun Bazaz, Regional Manager, Channel Sales, Middle East and Turkey at Aruba, a Hewlett Packard Enterprise company, elaborates on how SMEs are a growing target for cybercriminals in the Middle East and why specialisation can help partners be successful here.
How to overcome hybrid cloud management challenges
Martin Percival, Senior Solutions Architect, Red Hat, on overcoming the challenges of hybrid cloud management.
How partners can grab opportunities with both hands
Osama AlHaj-Issa, Regional Channel Director, Middle East and Turkey, Aruba, a Hewlett Packard Enterprise company, shares how partners can seize market opportunities to be successful.
The path to cyber resilience
Clinton Firth, MENA Cyber Leader, EY Africa, India and Middle East (AIM), on how organisations can build resilient systems to protect themselves against cyber threat actors.