Magazine Button


Zombies, ghosts, goblins and DDI . . . Oh my!

Zombies, ghosts and goblins will be walking the streets this Saturday as we celebrate Halloween, but the scariest creatures aren’t knocking on your door for trick or treat – they’re in your data centre. These ghoulish guests include: Zombie servers are plugged in and running, but aren’t doing any actual work. So they’re sucking up […]

The show that is 35 years young

This year sees GITEX celebrate its 35th birthday. During those times the show has experienced huge growth and not only is it the largest technology show in the region but the fourth largest globally. Over the year’s I’ve heard many companies mention how GITEX doesn’t work for them, yet still we see the number of […]

Cyber security on your travels

On a business trip – and especially on vacation – it’s easy to overlook the security measures that you instinctively take at home. Kaspersky Lab’s experts share advice on what you need to do to make sure your hotel Wi-Fi access is secure, you’re safe to buy tickets online and how you can respond if […]

Trend predictions for 2015

The year 2014 was marked by a number of potentially historic technological innovations. From Europe taking the front seat in the driverless car industry, to wearable technology – whether it is smart spectacles or connected watches – finally becoming mainstream, 2014 has seen technologies first conceptualised in science fiction start to become reality. And with the […]

Tis’ the season for credit card data theft

Lucas Zaichkowsky, Enterprise Defense Architect, Resolution1 Security, provides insights into attacks and addresses how to detect targeted attacks in progress and respond before major damage occurs. With Christmas around the corner, the shopping frenzy will begin as consumers find good deals and retailers increase their sales revenues, but they’re not the only ones that benefit from […]

How to clear out cookies, flash cookies and local storage

Chester Wisniewski-Senior Security Advisor at Sophos, outlines  a quick fix to show you how to clear out cookies and the cookie-like things that can be used to track you online. Why cookies are important Cookies are very small pieces of information given to your web browser by the sites you visit. Your browser will store the cookies […]

Future-proofing the corporate data centre

Curt Beckmann, Chief Technology Architect, EMEA, Brocade, breaks down how technology trends such as big data, cloud and pervasive mobility are transforming the way we live and work, and having a dramatic impact on businesses and consumers. The benefits from these trends are varied and wide-ranging, but they all have a common element underpinning them; […]

Protecting educational data

Pradeesh VS, General Manager at ESET Middle East, provides eight IT security measures for educational institutes to secure their data and systems.  There is a clear trend towards the increased utilisation of IT system in Middle East educational institutions. In its predictions for 2014, IDC estimated that ICT spending in the Middle East would top $96 […]

Social routing in the contact centre

Dave Paulding,Regional Sales Director UK & Middle East at Interactive Intelligence, explains the emerging trend of social routing and the modern day customer. Social routing is an emerging trend, a way in which contact centres can more accurately meet the needs of their customers. But how is this different from what we’re doing at the […]

The Internet of Things comes to the enterprise

Chris Gray, Director, Embedded and Intelligent Systems, Red Hat, provides this brief blog on how important it is for organisations to build innovative, perhaps even futuristic, IoT solutions for customers if they want to be successful. If you’ve been reading about the Internet of Things (IoT) market, you’re probably wondering why all the buzz is about consumer […]

Controlling data risk in the BYOD onslaught

Nizar Elfarra, Pre Sales Director, CommVault, presents a comprehensive blog overview of the BYOD era in full swing and how this is posing a higher level of data security risk to enterprises. CIOs are faced with balancing the needs of workers to be more mobile and have more choice with the needs of the enterprise to protect […]

Three ridiculous myths about cyber-security

In this latest blog by industry expert, John Bentley, Director, Middle East, Africa and India at AccessData, myths around cyber-security are exposed.   1)     You can 100% keep the bad guys from getting in.  The truth is, if the bad guys want in bad enough they will find a way in.  Advanced attackers and the APT […]