Blogs

Advanced cyber attacks that hide in SSL traffic

From Target to Sony, and Anthem to Ashley Madison, no company is immune to the risk of cyber-attacks and the resulting loss of customer information. Network security solutions can reduce the risk of attack, but...

Choosing the right cloud for your enterprise

In the computer animated science fiction comedy “Cloudy with a chance of Meat Balls”, I see a parallel to the widespread dilemma that we face today – that of deciding the approach for...

Zombies, ghosts, goblins and DDI . . . Oh my!

Zombies, ghosts and goblins will be walking the streets this Saturday as we celebrate Halloween, but the scariest creatures aren’t knocking on your door for trick or treat – they’re in your data...

The show that is 35 years young

This year sees GITEX celebrate its 35th birthday. During those times the show has experienced huge growth and not only is it the largest technology show in the region but the fourth largest globally. Over the...

Cyber security on your travels

On a business trip – and especially on vacation – it’s easy to overlook the security measures that you instinctively take at home. Kaspersky Lab’s experts share advice on what you need to do to...

Trend predictions for 2015

The year 2014 was marked by a number of potentially historic technological innovations. From Europe taking the front seat in the driverless car industry, to wearable technology – whether it is smart...

Browse our latest issue

Intelligent CIO Middle East

View Magazine Archive