While creating a data strategy might be challenging, it is crucial for Middle Eastern businesses looking to expand and remain competitive.
Finesse and Orca Security team up to secure operations in the cloud
Transforming the way businesses operate in the cloud.
The importance of digital resilience in an uncertain world
Enterprise organisations’ daily dependence on technology is not only all-encompassing, but also growing deeper and even more fundamental to its operations. There is no way of slowing this continuing digital transformation.
F5 Safeguards Digital Services with New AI-Powered App and API Security Capabilities
Enhanced API defences, granular machine learning capabilities, and new managed service offerings provide comprehensive protection across distributed environments.
Low code platform solutions: The future of software development in the Middle East
GCG Enterprise Solutions’ Waleed Alawadi reflects on the inevitable trend shaping the future.
IT teams are increasingly adopting OpenTelemetry to optimize cloud performance
Gregg Ostrowski, CTO Advisor at Cisco AppDynamics, discusses the technology organizations need to optimize application availability and performance, why IT …
What does the metaverse mean for our digital identities?
Saeed Ahmad, Managing Director Middle East and North Africa at Callsign, outlines what the metaverse means for our digital identities …
As cyber attacks soar, here’s how businesses can curtail the cost of data breaches
As the Middle East makes a concerted effort to grow its knowledge and skills-based economy, the role of data in driving innovation, transformation and success cannot be overstated.
Introducing content disarm and reconstruction – the zero-trust rebel that frisks every file
Instead, let us consider technology that does not rely on detection but follows zero-trust principles and assumes all files are malicious. This method works by first verifying a file’s type and identifying any embedded content. It removes any content it considers to be potentially malicious and reconstructs the file using only legitimate components. We call this sanitisation method “content disarm and reconstruction”, or CDR.
NETSCOUT’s DDoS Threat Intelligence Report reveals alarming surge in direct-path attacks
NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT), a leading provider of performance management, cybersecurity, and DDoS protection solutions, has released findings from …
AI: A megatrend that’s ushering in a brave new world
Raviteja Dodda, CEO & Co-Founder at MoEngage highlights how businesses are increasingly turning to AI to improve efficiency, empower employees, …
AI and the Future of Jobs
Overall, it is inevitable that the adoption of AI will disrupt industries and change the nature of jobs. However, it will create new opportunities and ways of working that could revolutionise industries.
SentinelOne recognised as a leader in endpoint protection platforms
Cybersecurity Company SentinelOne Positioned as Leader for Second Consecutive Report.
Exclusive interview: Murali Vellat, Division Manager, Bulwark Technologies
Anita Joseph caught up with Murali Vellat, Division Manager at Bulwark Technologies, to find out how the company’s strong partner …
Private 5G Networking: How Red Hat and partners are driving deeper value
Red Hat OpenShift comes with an ecosystem of skilled and certified partners that offer networking and operational capabilities used for applications, managed together on the same platform.
What must data backup & recovery look like today? Experts weigh in
It happens to all of us — that one precious photo or video that immortalised a special moment but doesn’t …
Importance of XDR in the shared cloud responsibility model
Cloud service providers now recognise their responsibility for security lies around their infrastructure and services provided for enterprises says Tamer Odeh, Regional Sales Director, from SentinelOne.
Innovation remains a long-term strategy for Huawei
Huawei 2022 R&D expenses hit a 10-year high in amount and percentage of revenue. Steady Operations, Sustainable Survival and Development.
Qualys’ 2023 TruRisk report: more than 2.3 billion vulnerabilities detected worldwide in 2022
A prominent supplier of cloud-based IT, security, and compliance solutions, Qualys Inc. (NASDAQ: QLYS), has issued its 2023 TruRisk Research …
Kaspersky shares 3 tips to keep data safe this World Backup Day
World Backup Day, recognised on 31 March, puts the importance of backing up data in the spotlight for both businesses and individuals, especially as the cyberthreat landscape continues to evolve.