CNME Editor Mark Forker secured an exclusive interview with Tarek Khalil, Director, Middle East & North Africa, Google Cloud, to …

CNME Editor Mark Forker secured an exclusive interview with Tarek Khalil, Director, Middle East & North Africa, Google Cloud, to …
The relationship will see Wärtsilä extend the solution to help its own customers visualise their OT environments.
Nutanix, a leader in hybrid multicloud computing, together with technology partner HPE, and channel partner Mannai – HP Solutions, a …
Google Cloud has today announced a collaboration with the Saudi Pharmaceutical Industries and Medical Appliances Corporation (SPIMACO) that involves one …
Search engine passes 100-million milestone for daily users following February’s launch of a range of advanced capabilities, from automated research summaries of large-text sources to help with text composition for social media posts.
Scalability, operational simplicity, and sustainability – with zero compromises.
CNME Editor Mark Forker spoke to Reem Asaad, Vice President – Middle East & Africa, at Cisco, to find out …
A cybercriminal group used an exploit developed for different versions and builds of Windows OS, including Windows 11, and attempted to deploy the Nokoyawa ransomware.
In moving from chief technology evangelist to CTO, Asanka Abeysinghe will lead the external architecture strategy for WSO2’s open-source and SaaS solutions, which enable software development teams to securely deliver consumer-driven applications.
While creating a data strategy might be challenging, it is crucial for Middle Eastern businesses looking to expand and remain competitive.
Transforming the way businesses operate in the cloud.
Enterprise organisations’ daily dependence on technology is not only all-encompassing, but also growing deeper and even more fundamental to its operations. There is no way of slowing this continuing digital transformation.
Enhanced API defences, granular machine learning capabilities, and new managed service offerings provide comprehensive protection across distributed environments.
GCG Enterprise Solutions’ Waleed Alawadi reflects on the inevitable trend shaping the future.
Gregg Ostrowski, CTO Advisor at Cisco AppDynamics, discusses the technology organizations need to optimize application availability and performance, why IT …
Saeed Ahmad, Managing Director Middle East and North Africa at Callsign, outlines what the metaverse means for our digital identities …
As the Middle East makes a concerted effort to grow its knowledge and skills-based economy, the role of data in driving innovation, transformation and success cannot be overstated.
Instead, let us consider technology that does not rely on detection but follows zero-trust principles and assumes all files are malicious. This method works by first verifying a file’s type and identifying any embedded content. It removes any content it considers to be potentially malicious and reconstructs the file using only legitimate components. We call this sanitisation method “content disarm and reconstruction”, or CDR.
NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT), a leading provider of performance management, cybersecurity, and DDoS protection solutions, has released findings from …
Raviteja Dodda, CEO & Co-Founder at MoEngage highlights how businesses are increasingly turning to AI to improve efficiency, empower employees, …