What do Middle East governments need when it comes to security, and are newly formed government entities set to revolutionise the way that states think about security?
![](https://www.tahawultech.com/wp-content/uploads/2014/02/classified-1-840x440.jpg)
What do Middle East governments need when it comes to security, and are newly formed government entities set to revolutionise the way that states think about security?
Mohamed Sayed, SGI Cloud Computing Leader – MEA at IBM gives Computer News Middle East his insider tips for ways that the cloud is most likely to impact businesses in 2014.
Google aims to equip meeting rooms with videoconferencing capabilities with the launch of its product for businesses, Chromebox.
Huawei is reportedly being investigated by the Indian Government over alleged ‘hacking’ of equipment belonging to state-run telecoms firm Bharat Sanchar Nigam Ltd (BSNL).
We caught up with several CMOs and marketing executives to find out what they’d ask of IT if they could speak frankly. Here are their seven key requirements.
Jesse Proudman, founder, Blue Box Group, gives five core tenets you should assess when weighing private cloud against public cloud options
British intelligence agency Government Communications Headquarters (GCHQ) has reportedly infiltrated hacktivist groups and used denial-of-service and other techniques to disrupt their online activities.
Arbor Networks has released its 9th Annual Worldwide Infrastructure Security Report, which has found a 36 percent increase in organisations targeted by Advanced Persistent Threats.
HID has released its projections for trends that will have the greatest impact on the secure identity industry in 2014.
FireEye has announced the release of FireEye OS 7.1, the update to the FireEye OS.
In a recent blog post, Frost & Sullivan analyst Andrew Milroy predicts that more data will be generated by machines, or things, this year than by human beings.
As more security technologies have made the switch from analogue to Internet Protocol, lines between security and IT have blurred, with CIOs and IT heads becoming increasingly responsible for an organsiation’s security.
The attack on Yahoo that started with the theft of user credentials from a third-party database highlights the risk of sharing usernames and passwords across multiple websites.
IDC recently predicted that CIOs will be forced to take a ‘mobility first’ approach to building networks, whereby mobility solutions and BYOD policies are integrated into infrastructures. How accurate is this prediction, and is the Middle East really ready to put mobile first?
StarLink has conducted its Annual Partner Conference for 2014 in Dubai, during the all-day event, StarLink and six of its key strategic vendors presented to strategic partners, and resellers alike, to enhance engagement and strengthen business relationships.
Reseller ME catches up with Hidenori Taguchi, Head of Marketing, B2B Products and Solutions, Sony Professional Solutions MEA at Intersec recently, to gain insight into security camera business.
The security space in 2013 will go down in history as a sector dominated by the work of Edward Snowden, Gartner has said.
Windows XP’s disappearance and Windows 8’s march toward some form of success were both put on hold in January, Web analytics firm Net Applications said Saturday.
2014 marks the 10th anniversary of Cabir, the world’s first mobile phone malware. To mark this occasion, Fortinet’s FortiGuard Labs is taking a stroll down memory lane to examine the evolution and significance of mobile threats during the last 10 years.
Riverbed has unveiled Riverbed Granite 2.6, with new features that support bigger data sets and additional enterprise-class storage solutions, including IBM Storwize V7000.