ESET’s detection and response capabilities tested in MITRE Engenuity ATT&CK Evaluations.
AHAD in strategic partnership with YesWeHack, a Global Bug Bounty and VDP platform
AHAD in strategic partnership with YesWeHack, a Global Bug Bounty and Vulnerability Disclosure Policy (VDP) platform.
F5 Unveils Cloud-Native Network Functions for Modern Telco Workloads
F5 Unveils Cloud-Native Network Functions for Modern Telco Workloads.
Five reasons why edge is an essential component to future proof computing
Five reasons why edge is an essential component to future proof computing.
ESET refreshes product portfolio to better protect businesses on their digital journey
ESET refreshes product portfolio to better protect businesses on their digital journey.
Overcoming the Challenges of Mining Big Data
Overcoming the Challenges of Mining Big Data.
Lenovo Reveals “Lenovo 360” Global Channel Framework, Enables Greater Access to Solutions for Partners
Lenovo Reveals “Lenovo 360” Global Channel Framework, Enables Greater Access to Solutions for Partners.
CyberRes Strengthens IT Security by Combining Deep Analytics with Threat Research Network
CyberRes Strengthens IT Security by Combining Deep Analytics with Threat Research Network.
Huawei Middle East IT Day 2022 Spotlights Full-Stack Data Centre Solutions
Huawei Middle East IT Day 2022 Spotlights Full-Stack Data Centre Solutions.
UAE organisations are early adopters of Kubernetes technology, but data protection uptake remains worryingly slow, finds Veritas research
UAE organisations are early adopters of Kubernetes technology, but data protection uptake remains worryingly slow, finds Veritas research.
Alteryx Launches Updated Partner Program to help achieve business breakthroughs
Alteryx Launches Updated Partner Program to help achieve business breakthroughs.
RiskXchange partners up with Bulwark Technologies, an established cybersecurity distributor in the Middle East region
RiskXchange partners up with Bulwark Technologies, an established cybersecurity distributor in the Middle East region.
Cybersecurity survival tips for small businesses: 2022 edition
How can businesses that lack the resources and technological expertise of large organisations hold the line against cybercriminals?
HUAWEI CLOUD Summit MEA 2022 reiterates the importance of inspiring innovation with ‘Everything as a Service’
HUAWEI CLOUD Summit MEA 2022 reiterates the importance of inspiring innovation with ‘Everything as a Service’.
AOC Unveils G3 Series of G Line Monitors in Kuwait
AOC Unveils G3 Series of G Line Monitors in Kuwait.
Microsoft for Startups’ GrowthX Accelerator program welcomes second cohort of B2B tech startups
Microsoft for Startups’ GrowthX Accelerator program welcomes second cohort of B2B tech startups.
Omnichannel Communications’ Role in Cultivating the B2C Relationship
Today’s customers want to know how they can reach a business before committing, and more importantly, whether or not their experience will be seamless, consistent, and personalised. By Fejsal Čelebić, Product Sales Expert, Infobip.
Evanssion Strengthens Noname Security Partnership to Accelerate Adoption of API Security
Evanssion Strengthens Noname Security Partnership to Accelerate Adoption of API Security.
Cybersecurity automation: differing priorities show need for better C-Suite awareness of benefits
Cybersecurity automation: differing priorities show need for better C-Suite awareness of benefits.
Mastering Mega-VMS with HCI 2.0
Mastering Mega-VMS with HCI 2.0.