Magazine Button


Document Digitisation – On the Road to Digital Transformation

For many companies in the Middle East, the biggest challenge when establishing a digital transformation strategy is to determine when and how to digitise paper documents. The decision-making process needs to factor in the requirement to scan legacy files, as well as put processes in place to capture all newly created or acquired information quickly […]

Ashraf Sheet, Infoblox: Securing DNS Infrastructure against Malicious Domains

The constant creation of malicious domains has proved a cat and mouse game for threat researchers and cybercriminals. Across the world, new malicious domains are constantly being created from which cybercriminals can launch attacks against businesses’ Domain Name System (DNS) infrastructure. During what is known as the ‘planting’ phase, the Infoblox DNS Threat Index, which […]

Intel Security : New Global Cybersecurity Report

Intel Security, in partnership with the Centre for Strategic and International Studies (CSIS), has released “Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity,” a global report and survey revealing three categories of misaligned incentives: corporate structures versus the free flow of criminal enterprises; strategy versus implementation; and senior executives versus those in implementation […]

Are you ready for the Internet of Things?

The Internet of Things (IoT) will transform your business. Heard it all before? The explosion of connected devices and the increasing number of businesses embracing them for mainstream operations, has meant that analysts are now estimating that over 20 billion “things” could be circulating by 2020. But, how will it transform business as we know […]

Latest research reaffirms importance of FINTECH across MENA

The latest research on digital use and e-commerce in the Middle East demonstrates that investment in technology and innovation in the financial services sector is now essential, according to the organisers of the largest financial technology event in the region. Chris Fountain, Managing Director of Turret Media, organisers of MEFTECH 2017, noted that the research […]

10 trends that will impact open-source technology

Open source has become an integral piece of every developer’s arsenal. The power of the community, the wisdom of many, and the ability to hook into various systems and solutions make open source incredibly powerful, writes Mohammed Al-Moneer, Regional Director, MENA, A10 Networks. As 2017 gathers steam, we at A10 Networks decided to identify 10 trends […]

Attacker innovation and IoT exploitation fuel DDoS attacks

Arbor Networks, the security division of NETSCOUT, has released its 12th Annual Worldwide Infrastructure Security Report (WISR). The report covers a range of issues from threat detection and incident response to managed services, staffing and budgets. Its focus is on the operational challenges Internet operators face daily from network-based threats and the strategies adopted to address and […]

Crossover technologies key to Qatar’s water security, shows GI survey

Qatar’s industry and academia must prioritise research and development (R&D) into crossover technologies in order to improve the country’s water security, according to 48% respondents of the Gulf Intelligence (GI) Industry Survey of 150 professionals in Qatar. Improving Qatar’s water security is one of the three key challenges outlined in Qatar’s National Vision 2030, along […]

Setting-up-shot in the MENA region and ‘cultivating locality’

The Middle East has in recent years become one of the most active IT markets and organisations in the region are often found to be the earliest adopters of the latest technologies and trends. It is easy to see the potential for growth in the region and yet, only a few locally established IT companies […]

Multi-layered security: Defending from all sides

The threat landscape in the Middle East is ever evolving and always advancing with tailor-made, stealthy threats that evade traditional, point-in-time security defences. Instead of relying on a single attack vector, an advanced attack will use whatever unprotected paths exist, often combining paths in a blended method, to reach its target and accomplish its mission, […]

Qatar: Market worries hit smartphone sales

As mobile phone companies go aggressive to grab Qatar’s market share in the new year, the local electronic market is witnessing a perceptible slow down. The sales of electronic gadgets and other items, especially the high-end smartphones, have witnessed a decline over the last few months in Qatar compared to the same period a year […]

Disaster recovery – Critical to the ‘Always-On’ business

In the age of the ‘Always-On’ business, companies are facing new demands from end users including 24/7 access to data and applications and whom have no patience for downtime or data loss, all this while grappling with an exponential data growth of  30-50% per year, writes Gregg Petersen, Regional Director, Middle East and SAARC, Veeam Software. […]

Browse our latest issue

Intelligent CIO Middle East

View Magazine Archive