Blogs

Inconvenient truth of hidden conflict in the C-suite

A little bit of conflict between members of the C-suite is inevitable. When each member has different priorities and business objectives to the rest of the C-suite, it’s possible for this conflict to cause...

4 opportunities afforded by an ADC refresh

An application delivery controller (ADC) refresh is a great occasion to look to the future and optimise your network for not only the applications you have in place today, but what you will have tomorrow....

Why DNS shouldn’t be used for data transport

Malicious DNS tunnelling is a big problem in cyber security. The technique involves the use of the Domain Name System (DNS) protocol to smuggle sensitive corporate or personal information out of a network, and to...

10 questions to ask your ADC provider

Application Delivery Controllers (ADCs) are networking devices that reside in the data centre and serve as a key part of an application delivery network. With the explosion in Internet traffic, business applications,...

Hack of Yahoo accounts – and the 700-day fallout!

On Thursday, September 22, 2016, Yahoo confirmed that hackers stole the personal data associated with at least 500 million Yahoo accounts. Details including names, passwords, email addresses, phone numbers and security...

Smart device hacking gets real

For years now, cyber security risk exaggerators have been talking about the threat to connected devices from hackers and other cybercriminals. But most observers have scoffed at stories of networked fridges or...

Browse our latest issue

Intelligent CIO Middle East

View Magazine Archive