A recent study revealed that the cybersecurity risk posed to enterprises by personal devices and Internet of Things devices are rising in significance.

A recent study revealed that the cybersecurity risk posed to enterprises by personal devices and Internet of Things devices are rising in significance.
Value-added distributor Redington Value has signed a regional distribution contract with Nutanix, an enterprise cloud computing vendor, for the Middle …
The latest report found more than 14,277,163 pieces of spam and 9,992 emails containing dangerous file types – all missed by the incumbent providers and delivered to users’ inboxes.
Kaspersky Lab experts have uncovered a new cyberespionage campaign “Operation Parliament” that is targeting high profile organisations from around the world with a focus on the Middle East and North Africa.
Dell EMC has announced the results of new research conducted by Enterprise Strategy Group (ESG) into the benefits of IT Transformation which affirms that IT Transformation can result in bottom-line benefits that drive business differentiation, innovation and growth.
According to research and advisory firm Gartner, 48 percent of organisations that are implementing the Internet of Things (IoT) said they are already using, or plan to use digital twins (virtual representations of real objects) in 2018.
With cybersecurity spending rising sharply across the globe and cities becoming ever more connected with the adoption of the Internet of Things (IoT), organisations in both public and private sectors are recognising the increasing importance of cybersecurity.
When embarking on a digital business transformation, too often organisations ignore the need to change the mindset of their staff, according to Gartner.
Nearly half of Gulf enterprises describe their current ICT infrastructure as “out of date”, according to Microsoft’s Digital Transformation and readiness survey.
A new malware that attacks and infects victims through compromised routers and can run in kernel mode, giving it complete control over victim devices has been uncovered in the Middle East and Africa region.
GET TAHAWULTECH.COM IN YOUR INBOX