Blogs

Tis’ the season for credit card data theft

Lucas Zaichkowsky, Enterprise Defense Architect, Resolution1 Security, provides insights into attacks and addresses how to detect targeted attacks in progress and respond before major damage occurs. With...

How to clear out cookies, flash cookies and local storage

Chester Wisniewski-Senior Security Advisor at Sophos, outlines  a quick fix to show you how to clear out cookies and the cookie-like things that can be used to track you online. Why cookies are...

Future-proofing the corporate data centre

Curt Beckmann, Chief Technology Architect, EMEA, Brocade, breaks down how technology trends such as big data, cloud and pervasive mobility are transforming the way we live and work, and having a dramatic impact on...

Protecting educational data

Pradeesh VS, General Manager at ESET Middle East, provides eight IT security measures for educational institutes to secure their data and systems.  There is a clear trend towards the increased utilisation of...

Social routing in the contact centre

Dave Paulding,Regional Sales Director UK & Middle East at Interactive Intelligence, explains the emerging trend of social routing and the modern day customer. Social routing is an emerging trend, a way in which...

The Internet of Things comes to the enterprise

Chris Gray, Director, Embedded and Intelligent Systems, Red Hat, provides this brief blog on how important it is for organisations to build innovative, perhaps even futuristic, IoT solutions for customers if...

Browse our latest issue

Intelligent CIO Middle East

View Magazine Archive