Late on 27 June, the New York Times reported that a number of Ukrainian banks and Ukrenergo, the Ukrainian state …
Petya: What you need to know
Jimmy Graham, Director of Product Management, Qualys, dissects the latest cyber extortion campaign and lists out the steps to stay …
How to rescue your PC from Petya
Gary Davis, Chief Consumer Security Evangelist at McAfee, spells out the steps to fight ransomware such as NotPetya and WannaCry. …
Keep IT running: Tips to improve run-time container security
Gary Duan, CTO, NeuVector, shares 12 ways organisations can improve run-time container security. There still really aren’t many enterprise run-time …
Mitigating risk in the age of digital transformation
Srinivasan C.R, Senior Vice President, Global Product Management & Data Centre Services at Tata Communications, on how to adapt security …
SDN: The game changer for today’s networks?
Software-defined networking (SDN) opens up closed network platforms, allowing for greater oversight and more rapid provisioning of new services, writes …
How partners can differentiate in the cloud economy
Richard McLeod, global VP, Enterprise Software Channels, BlackBerry, explains how regional channel partners can thrive in the cloud-driven economy. There …
Why UAE is set to accelerate ICT-led innovation
Luc Serviant, VP of Orange Business Services and a member of the Accelerator Selection Committee of the new Dubai Smart …
The benefits of infusing data analytics into healthcare
David Whitton, General Manager of Kodak Alaris – Eastern Cluster, on why smarter data enables better patient outcomes and reduces costs for healthcare providers.
How to watch Apple WWDC 2017 live
Apple has confirmed that users will be able to live-stream the keynote for the Worldwide Developers Conference.
Backhaul sharing holds the key to 5G success
In response to the latest news story ‘Etisalat and Ericsson test 5G,’ Joao Sousa, Partner at global TMD advisory & …
Prepare for the inevitable security incident
A serious security incident is a question of “when,” not “if”, says Rob McMillan, Research Director at Gartner. The 2014 cyber attack on …
How to get effective data protection in the cloud
Despite the cloud’s presence, organisations are only recently starting to understand the level of cloud adoption that is appropriate for …
Endpoint security: Corporate cybercrime’s best defence
Biju Bhaskaran, Presales Manager, Alpha Data, encourages regional enterprises to deploy advanced protection at the endpoint level to stay ahead …