Gary Duan, CTO, NeuVector, shares 12 ways organisations can improve run-time container security. There still really aren’t many enterprise run-time …
Mitigating risk in the age of digital transformation
Srinivasan C.R, Senior Vice President, Global Product Management & Data Centre Services at Tata Communications, on how to adapt security …
SDN: The game changer for today’s networks?
Software-defined networking (SDN) opens up closed network platforms, allowing for greater oversight and more rapid provisioning of new services, writes …
How partners can differentiate in the cloud economy
Richard McLeod, global VP, Enterprise Software Channels, BlackBerry, explains how regional channel partners can thrive in the cloud-driven economy. There …
Why UAE is set to accelerate ICT-led innovation
Luc Serviant, VP of Orange Business Services and a member of the Accelerator Selection Committee of the new Dubai Smart …
The benefits of infusing data analytics into healthcare
David Whitton, General Manager of Kodak Alaris – Eastern Cluster, on why smarter data enables better patient outcomes and reduces costs for healthcare providers.
How to watch Apple WWDC 2017 live
Apple has confirmed that users will be able to live-stream the keynote for the Worldwide Developers Conference.
Backhaul sharing holds the key to 5G success
In response to the latest news story ‘Etisalat and Ericsson test 5G,’ Joao Sousa, Partner at global TMD advisory & …
Prepare for the inevitable security incident
A serious security incident is a question of “when,” not “if”, says Rob McMillan, Research Director at Gartner. The 2014 cyber attack on …
How to get effective data protection in the cloud
Despite the cloud’s presence, organisations are only recently starting to understand the level of cloud adoption that is appropriate for …
Endpoint security: Corporate cybercrime’s best defence
Biju Bhaskaran, Presales Manager, Alpha Data, encourages regional enterprises to deploy advanced protection at the endpoint level to stay ahead …
White hats
Alex Bennett, technical writer, Firebrand Training, explains why ethical hackers hold the top job in 2017.
Secure the apps, not the cloud
Mike Kail, chief innovation officer, Cybric, explains why the application stack is the new perimeter organisations need to protect.
WannaCry: The old worms and the new
This week’s attacks leveraging the WannaCry ransomware were the first time we’ve seen an attack combine worm tactics along with …