Aaron Charrington, Threat Intel Analyst, FireEye, gives some tips on what organisations can do to thwart the Heartbleed bug.
Safeguarding intellectual property – your crown jewels
Saeed Agha, General Manager, Middle East, Palo Alto Networks, discusses the importance of protecting sensitive information.
Intel taps Chinese tech hub to fuel mobile processor business
As devices powered by ARM chips flood the Chinese market, Intel is hoping to popularise its own mobile processors with a new centre built in the heart of one of China’s major technology hubs.
Symantec hotseat far from secure
It seems sadly ironic that the role of Symantec CEO is shrouded in insecurity. The antivirus and security software vendor …
ESET: 25,000 Unix servers hit with backdoor trojan
Security researchers at ESET, in collaboration with CERT-Bund, the Swedish National Infrastructure for Computing as well as other agencies, have uncovered a widespread cybercriminal campaign that has seized control of over 25,000 Unix servers worldwide.
Managing more
As enterprises move forward into the world of virtualisation, BYOD and cloud computing, the need for IT management services becomes more apparent. We spoke with Raj Sabhlok, President, ManageEngine, to discuss the role of IT management companies.
SDN – moving beyond the hype and realising its value
To overcome the rigidity of the traditional data centre network, software-defined networking has emerged as a popular solution, says Taj El Khayat, Managing Director, Middle East, Turkey, North, West and Central Africa, Riverbed Technology
Hands on with iOS 7.1: A few good improvements
Four months after releasing iOS 7 – the latest major update to the operating system controlling Apple mobile devices – iOS 7.1 has hit the airwaves, providing bug fixes, performance enhancements and a few welcome additions for your iPhone, iPad or iPod Touch.
Driving user satisfaction with IT
With growth in the Middle East at a high pace, IT departments are under pressure to deliver rapidly and contain costs. Along with fast delivery, IT operations have the responsibility to ensure services meet exacting standards with high availability, writes Steve Dulvin, a a senior technology officer in the banking industry.
6 tips to combat Advanced Persistent Threats
Experts say it takes time, training and collaboration to thwart APTs. But with these best practices, you can keep your defenses high.
Flash transforms storage technology
Elavarasu Shanmugam, Storage Sales Leader, Gulf Business Machines, highlights the less-known aspects of flash storage, in an age where increasing number of organisations are opting for analytics, and the requirement for low latency and quicker responses from storage is on the rise.
Weighing public against private cloud
A few years ago the only cloud in town was the public cloud, but today private and hybrid clouds are also true contenders. In fact, private cloud implementations address a prevalent set of challenges and issues that public clouds cannot and can help speed up and smooth the way of cloud adoption.
Bogged down in Big Data
The infinite monkey theorem states that if enough monkeys were to type on typewriters for long enough, they would eventually produce the works of Shakespeare. To some, that may seem incomprehensible.
Cutting through the cloud hype
Cloud computing is no longer a new concept, and many organisations have been consuming cloud services for the past several years. The use of cloud computing is growing, and by 2016 will increase to become the bulk of new IT spending, according to Gartner.