Nitya Ravi of CPI speaks to Mr. Ali Bahlooq, General Manager of Esharah Etisalat Security Solutions about the innovative solutions they offer to the organisations.
A Change of Mindset
Nitya Ravi speaks to Dr. Cherif Sleiman of Safe Security who explains the mistake organisations are making when it comes to Enterprise-wide security breaches.
What’s Next for Video Communications?
As we’ve seen over the past 18 months, video communications have tremendously benefited individuals, families, organisations, and governments. Video meetings made it possible for people to connect and collaborate even as they were miles apart. Moreover, many organisations came to realise how video communications improve productivity and work-life balance.
Document Scanners Backed by Comprehensive Services Improve ROI and Allow Organisations to Focus on Business Priorities
Document Scanners Backed by Comprehensive Services Improve ROI and Allow Organisations to Focus on Business Priorities.
Most enterprise networks riddled with vulnerable Java installations, report says
Despite the significant Java security improvements made by Oracle during the past six months, Java vulnerabilities continue to represent a major security risk for organisations.
R&M warns Middle East against investing in under-developed tech
Swiss structured cabling specialist R&M has warned Middle East organisations against premature investments as long as standards are not defined and components are not fully developed.
Prism harming US cloud provider business, European Commission claims
US cloud providers could miss out on billions of euros of business from European customers due to data privacy fears around the Prism surveillance programme, the European Commission has claimed.
A foundation stone of security
Companies and organisations should ensure that they have a full 360-degreee view of their data, says AccessData’s Paul Wright.
Microsoft unveils a 256GB Surface Pro variant aimed at businesses
Aside from the increased storage capacity, the 256GB Surface Pro mirrors the hardware of its siblings.
Twitter’s two-factor authentication implementation can be abused, researchers say
Twitter’s SMS-based, two-factor authentication feature could be abused to lock users who don’t have it enabled out of their accounts …