They are therefore prioritising automation and consolidation of their cybersecurity estates, a leveraging platform/mesh value propositions from leading cybersecurity vendors, according to the State of the Market Report 2023 by Help AG.

They are therefore prioritising automation and consolidation of their cybersecurity estates, a leveraging platform/mesh value propositions from leading cybersecurity vendors, according to the State of the Market Report 2023 by Help AG.
75% of CISOs in the UAE believe employees leaving the organisation contributed to the data loss incident, a challenge exacerbated by staff turnover.
A new report by Freshworks Inc., revealed a surprising juxtaposition for IT teams in the UAE.
Almost all UAE companies believe artificial intelligence (AI) can help them weather current economic uncertainty, but access gaps between technical …
Steven Yi, President of Huawei Middle East and Central Asia, highlighted how ICT-enabled solutions can reduce 20% of carbon emissions …
Sophos’ Annual State of Ransomware report details extensive findings.
Browser extensions have become an attractive target for hackers looking to exploit unsuspecting crypto users.
A report conducted by Pure Storage and Wakefield Research has shown that a staggering 90% of IT buyers purchased technology …
As the Treasury Automation helps treasury teams to harness more data and employ more analytics, those teams will become more strategic and capable of meeting their CFOs’ expectations.
Work Trend Index Special Report highlights positive impact of employee engagement on organisations’ bottom line.
According to the estimates by Kaspersky experts, prices per one minute of a deepfake video may range from $300 to $20,000.
Simran Bagga, Omnix, on how a people-first strategy has helped the company grow from strength to strength.
Vibhu Kapoor, Regional Vice President – Middle East, Africa & India, Epicor has penned an exclusive op-ed for tahawultech.com – …
The company also observed two new and significant trends, the use of zero-day vulnerabilities and the exploitation of recently discovered vulnerabilities.