Businesses are increasingly looking to their CISOs to define, implement, measure and communicate the strategies they need to both assess and manage all areas of risk.
Is cross-platform Data Loss Prevention a prerogative?
The Windows dominated company infrastructures are not so frequent anymore. Organisations and IT departments are challenged with multi-platform workstations thanks to several factors.
Hack of Yahoo accounts – and the 700 days it took to be discovered
On September 22, 2016, Yahoo confirmed that hackers stole the personal data associated with at least 500 million Yahoo accounts. Details including names, passwords, email addresses, phone numbers and security questions were taken from the company’s network in late 2014 by what is believed to be a state-sponsored hacking group.
Symantec introduces new security solution for SMBs
Symantec has introduced Symantec Endpoint Protection Cloud, a new solution for small and mid-sized businesses to protect them from targeted attacks and ransomware.
The battle of intelligence
The philosophical war between artificial intelligence (AI) and intelligence augmentation (IA) has been waged for more than half a century, with the focus shifting between the two as each has made important strides.
Harness the power of data chaos
Siddhartha Bhattcharya, VP Marketing, Kodak Alaris Information Management discusses his strategy for navigating the seemingly endless information at your company’s fingertips.
Hybrid cloud: The natural step
Cloud platforms are entering a new phase with higher expectations of returns pivoting around adoption of hybrid cloud, writes Clinton O’ Leary, Cloud Lead, Cisco Middle East.
Lean on IT
Mike Runda, Senior VP and President, Avaya Client Services, gives his take on how businesses can maximise the value of their support services investment.
Public potential
Gregg Petersen, Regional Director, MEA and SAARC, Veeam Software discusses how enterprises should be adopting the public cloud for a range of situations in their production environments.
IT shifts to mobile-first perspective
Latif Sheik, Account Manager, Finesse, explains why mobile development approaches need to be tailored to each industry.
Why CIOs should care about click fraud
Click fraud is more than just a marketing problem. It presents a real security risk to your organisation, experts say. CIOs need to know their enemy.
Improving network security
In May this year, we posted results of our ‘network protection survey’, which looked – among other things – at best practices in companies that were highly successful at network security.
Trust in the new world
There have been some major changes related to risk management in the last few years that have made many people take notice. Businesses and consumers alike are faced with new threats.
Can we trust ‘smart’ technology?
Automation is convenient and seemingly brilliant, but does that mean we should be handing over all responsibility to the machines?