HTC’s latest offering, the U11, has an impressive list of specifications from an innovative design to a swift performance, making it one of the most capable mobile device in the market today.
Cisco executive outlines Top 5 tips for mitigating the threat of device sharing
Martin Lee, EMEA Lead for Cisco Talos, outlines his 5 top tips to mitigate the ongoing threat of device sharing, … 0 7288 top cyber-attack maps and how to use them
Most of the cyber-attack maps online today are just ‘eye candy,’ but there are some creative ways they can be used.
Kalanick fires back at Benchmark Capital’s lawsuit
Former Uber CEO Travis Kalanick has fired back at the lawsuit filed against him by one of the company’s top investors, calling it “a fabrication” and accused the firm of threats and intimidation.
Future IT roles to become more challenging: report
ManageEngine has announced the results of its IT Service Management Future Readiness survey. The survey, which was conducted in collaboration with ITSM.tools, consisted of ten questions that focused on the opportunities and challenges ITSM will see in the future.
Decoding blockchain: How the distributed ledger tech can transform security
Will this promising distributed ledger technology transform cybersecurity?
Infoblox names new director for Middle East & Africa region
Infoblox has announced the promotion of Ashraf Sheet to the role of regional director for the Middle East and Africa regions.
Hulu taps AWS as cloud provider
Amazon Web Services (AWS), an Amazon.com company has announced that Hulu has selected AWS as its cloud provider, and leveraged AWS to launch its new, over-the-top (OTT) live TV service.
BT, Dell EMC team up to enhance network traffic management
BT and Dell EMC have announced a research collaboration agreement dedicated to exploring a new way of managing network traffic.
Hands-on: Zenfone AR
The Zenfone AR is only the second handset capable of running Tango apps. Here’s a taste of what it can do.
Securing the network in the age of IoT
The recent spate of ransomware attacks has put the spotlight back on network security, making it an uphill battle for almost all organisations in the region. With hackers always trying to get into networks though new and creative ways, the spending on network security, especially on firewalls/UTM products, have gone through the roof.