AI is already driving value across a range of business functions, writes Ahmed Helmy, CTO, Avaya International.
What you need to know about about “Yet-Another-Meltdown”
A brand new processor hardware vulnerability affecting modern Intel CPUs has been uncovered by Bitdefender researchers. Here’s what you need to know.
Happy World Password Day: experts share top tips to create secure passwords
Today is “World Password Day” and cybersecurity experts all across the globe are pointing out how bad our password habits …
How mobile networks are evolving in the 5G era
Fifth generation networks, just like the preceding 4G LTE and WiMAX networks, are expected to greatly increase available bandwidth, with improved end-to-end performance providing a better end-user experience.
Wi-Fi 6: Through the eyes of the Standards Working Group
Huawei’s chief technology officer for the Middle East Faisal Malik explains why Wi-Fi 6 has the potential to be a game-changer for delivering bandwidth-intensive applications, delivering a superior user experience.
How to prevent data manipulation attacks
Data manipulation attacks—attacks in which adversaries don’t take data but instead make subtle, stealthy tweaks to data usually to elicit some type of gain—can be just as, if not more crippling for organizations than theft.
How partners can play a role in selling AI
Value-added distributor Enterprise Systems’ Training Academy is fully equipped to assist partners in delivering Artificial Intelligence solutions effectively.
RSAC 2019: Cybersecurity trends for the year ahead
Dr Aleksandar Valjarevic, Head of Solutions Architecture, Help AG Middle East, shares some of the key takeaways from the recently …
Exploring the three Ps of channel
Nehul Goradia, co-founder, Enabler ONE, guides channel managers on how they can effectively manage their partner ecosystem through planning, perseverance …
Employees: the champions of a strong cybersecurity culture
Let’s face it, employees don’t care about security awareness training. That’s because most companies are still approaching it in the …
Why cybersecurity needs both AI and human intelligence
AI and humans must work together. AI applies power and programming, while human intelligence contributes judgment, imagination, and creativity.
Why vulnerability management and response are more than just checking patches
If enterprises do not have all these resources in-house, they can bring them in as a service from a suitable vulnerability management and response service provider.
Four email oversights that put organisations at risk
As part of onboarding, new hires typically sign an employee handbook which includes policies and guidelines for acceptable information technology …
Barracuda Networks on achieving total email protection
As an integral communication and collaboration tool for any organisation across the globe, email remains an attractive attack vector for cybercriminals. Husni Hammoud, general manager, Middle East, CEE and Turkey, Barracuda Networks, discusses how organisations can stay one step ahead of the bad guys.