AI is already driving value across a range of business functions, writes Ahmed Helmy, CTO, Avaya International.
![](https://www.tahawultech.com/wp-content/uploads/2019/04/Ahmed-Helmy-CTO-Avaya-International-e1555309740115-840x440.jpg)
AI is already driving value across a range of business functions, writes Ahmed Helmy, CTO, Avaya International.
A brand new processor hardware vulnerability affecting modern Intel CPUs has been uncovered by Bitdefender researchers. Here’s what you need to know.
Today is “World Password Day” and cybersecurity experts all across the globe are pointing out how bad our password habits …
Fifth generation networks, just like the preceding 4G LTE and WiMAX networks, are expected to greatly increase available bandwidth, with improved end-to-end performance providing a better end-user experience.
Huawei’s chief technology officer for the Middle East Faisal Malik explains why Wi-Fi 6 has the potential to be a game-changer for delivering bandwidth-intensive applications, delivering a superior user experience.
Data manipulation attacks—attacks in which adversaries don’t take data but instead make subtle, stealthy tweaks to data usually to elicit some type of gain—can be just as, if not more crippling for organizations than theft.
Value-added distributor Enterprise Systems’ Training Academy is fully equipped to assist partners in delivering Artificial Intelligence solutions effectively.
Dr Aleksandar Valjarevic, Head of Solutions Architecture, Help AG Middle East, shares some of the key takeaways from the recently …
Nehul Goradia, co-founder, Enabler ONE, guides channel managers on how they can effectively manage their partner ecosystem through planning, perseverance …
Let’s face it, employees don’t care about security awareness training. That’s because most companies are still approaching it in the …
AI and humans must work together. AI applies power and programming, while human intelligence contributes judgment, imagination, and creativity.
If enterprises do not have all these resources in-house, they can bring them in as a service from a suitable vulnerability management and response service provider.
As part of onboarding, new hires typically sign an employee handbook which includes policies and guidelines for acceptable information technology …
As an integral communication and collaboration tool for any organisation across the globe, email remains an attractive attack vector for cybercriminals. Husni Hammoud, general manager, Middle East, CEE and Turkey, Barracuda Networks, discusses how organisations can stay one step ahead of the bad guys.