Top Stories

Protecting businesses from potential catastrophic risks

Mohamad Rizk, Manager System Engineers, Middle East at Veeam, looks at how companies need a recovery plan in the event of disasters happening. Unpredictability is a fact of life, and nature brings plenty of it. Be it flooding, fire or even earthquakes and hurricanes, businesses worldwide can be susceptible to a whole range of natural […]

Oman Data Park and Cisco partner for managed security services

Oman Data Park (ODP) and Cisco have announced that ODP has deployed Cisco Advanced Malware Protection (AMP) as part of its ODP Managed Security Services for endpoint protection. Oman Data Park is the first managed service provider in Oman, offering managed cloud services, public cloud, co-location and managed security services to both large and small […]

Airtel and Telecom Egypt announce partnership for submarine cabling

Bharti Airtel, a leading global telecom services provider, and Telecom Egypt, the country’s first integrated telecom operator, have announced a strategic partnership where Airtel will get IRUs (Indefeasible Right of Use) on Middle East North Africa Submarine Cable (MENA Cable) and TE North Cable Systems. In addition, Airtel will also take large capacities on a […]

How parents can protect children from disturbing ‘Momo’ game

Kaspersky Lab has issued guidance to parents following reports about a disturbing game targeting young WhatsApp users. Momo is reportedly pitting youngsters against anonymous users, who may spur them to commit violent or suicidal acts. The premise of the game is to challenge teens to communicate with an unknown user, who will send them violent […]

Email security solution for oil companies to be launched in ME

Receive GUARD, an email security solution that was introduced to the industry in Oman and designed for oil and trade companies, is set to be launched in the Middle East.  Built on an AI-based platform, Receive GUARD is capable of learning from and analysing Arabic-language emails to effectively block business email compromise (BEC) scams and new malware for […]

The truth about Artificial Intelligence’s impact on jobs in the UAE

With Artificial Intelligence driving every CIO’s agenda, concerns about its impact need to be addressed. Allan Leinwand, CTO, ServiceNow, analyses its impact on the job market in the UAE. According to a recent research report from PwC, Artificial Intelligence (AI) is expected to account for approximately 13.6% of the United Arab Emirates’ GDP in 2030. However, […]

Fortinet signs cyberthreat information sharing agreement with IBM

Fortinet, a global leader in broad, automated and integrated cybersecurity solutions, has announced that Fortinet and IBM Security will collaborate through the bi-directional sharing of cyberthreat information. The goal of the agreement is to proactively combat cyberthreats and threats to privacy globally through the sharing of contextual threat information generated by the Fortinet FortiGuard Labs […]

Pure Storage expert: Making the journey to the all-flash cloud

Enterprise IT leaders are facing critical decisions on how to build a data-centric IT infrastructure that will allow them to harness the value of their data. Christian Putz, Director, Emerging Markets, EMEA, at Pure Storage, explains why an underlying all-flash cloud strategy will be a crucial component of such an endeavour. The cloud should be […]

Is it becoming easier for cybercriminals to access company data?

Ashraf Sheet, Regional Director, Middle East and Africa at Infoblox, looks at how companies can balance giving employees freedom to use their devices in the workplace while ensuring the network remains secure. We are in the age of the ‘office of the future’ – every company now battles it out to attract staff and clients […]

Blockchain security – Moving beyond the hype and securing it

Morey Haber, Chief Technology Officer, BeyondTrust, says he is amazed at the buzz around Bitcoin, Blockchain, and cryptocurrency. He says: “The truth is that Blockchain has a limited place in business and needs to be secured just like any other application; with some twists.” The ‘why’ Blockchains are not a database replacement, nor will be […]