A survey by Bloomberg has found that prominent thought-leaders in the Middle East, believe that China and India has now …
Cisco executive outlines Top 5 tips for mitigating the threat of device sharing
Martin Lee, EMEA Lead for Cisco Talos, outlines his 5 top tips to mitigate the ongoing threat of device sharing, … 0 682Poor data management costing businesses $20m every year: Veeam
A comprehensive report from IT leader Veeam Software, has shown that poor data management is costing businesses millions every year.
Dubai offers higher quality of life than New York, London
However, Dubai is the most expensive city to surf the Internet, according to a Deustche Bank report.
Chief digital officer role growing, but confusion remains: CA Technologies
According to a study by IT management solutions provider, CA Technologies, 47 percent of senior leaders agree that the role of …
CIOs Need to Push BYOD Policies to Lure Millennials
CIOs who think they can abandon BYOD risk upsetting an important and growing constituency of their workforce: millennials, also known as Generation Y.
Android market more fragmented than ever, report says
Fragmentation has been both a blessing and a curse for Android since the beginning, and a new report says that’s not changing any time soon.
MPs declare that the UK is losing the war on cyber crime
A Home Affairs Select Committee has stated that the UK is losing the war on online criminal activity and that the government is too complacent in targeting cyber criminals.
Text analytics can help businesses soothe upset callers
Using text analytics technology to analyse call-centre transcripts and customer surveys, emails and tweets can improve customer service.
Most BYOD businesses exposing data to cyber criminals
New research has shown that the vast majority of businesses are exposing sensitive corporate data to cyber-criminals by failing to implement effective BYOD strategies.
Why help desk employees are a social engineer's favourite target
A new report from the SANS Institute and RSA on help desk security and privacy finds help desk workers are the easiest victims for a determined social engineering criminal.