Last year, Forrester noted that, “The honeymoon for enterprises naively celebrating the cure-all promises of artificial intelligence technologies is over… …

Last year, Forrester noted that, “The honeymoon for enterprises naively celebrating the cure-all promises of artificial intelligence technologies is over… …
Whether it is caused by cataclysmic weather, technological malfunctions or human actions, an IT outage can be devastating.
Ashraf Sheet, regional director, Middle East and Africa, Infoblox, discusses why threat intelligence sharing is key to staying cyber-resilient in the connected era.
Alain Penel, regional vice president, Middle East, Fortinet, advises partners to take advantage of the opportunities that help customers reassess …
Alain Penel, regional vice president, Middle East, Fortinet, advises partners to take advantage of the opportunities that help customers reassess …
The Middle East telecom sector is booming with opportunities for operators to transform their revenue models through the introduction of …
Necip Ozyucel, Cloud & Enterprise Group Lead, Microsoft Gulf discusses the stark indicators that suggest we are not averse to letting the digital realm play a central role in the maintenance of our health.
By 2019, all digitally transformed organisations will generate at least 45% of their revenue from new business models. And as …
Phishing is one of the most common attack vectors for hackers who exploit end-user behaviour as the weakest link in an organisations cyber-defense.
CISOs must evolve the talent strategy to reflect the changing roles, competencies and skill sets to address digital risk.
The future classroom is well-connected with professors utilising Wi-Fi to their advantage to create an interactive learning experience. As we prepare for this shift, we look at some mistakes that must be avoided.
SAM, as we define it, is the people, process, and technology necessary for the effective management, control, and protection of the software assets and investments throughout all stages of the software lifecycle.
Data exists everywhere – generated by seemingly every “thing.” And we’re just getting started, it’s what I’ve been calling “Lots of Data Everywhere,” or L.O.D.E. – perhaps the “Mother LODE.”
There has been so much noise recently regarding the cloud that it’s sometimes hard to decipher what is important and what is extraneous.