Magazine Button

Insights

Editor’s Question: How can CIOs embrace the work from anywhere model?

Finally, there is a light at the end of the pandemic tunnel. As countries get closer to the easing of lockdowns and social restrictions, many organisations are starting to look forward to welcoming employees and clients back to the office. But if enterprise organisations are thinking that this is the end of working from home, […]


Security planning on a budget for CISOs

CISOs are under more pressure than ever to ensure their organisations thrive in order to survive, and investing in the right technology has a key part to play. David Higgins, EMEA Technical Director, CyberArk, offers his best practice advice and says that a massive budget increase isn’t required, but a change of approach. CISOs, security […]


Overcoming common email security misconceptions

As workforces adapt to the new work from home model, it has never been more important for organisations to invest in their email security. Brian Pinnock, Cybersecurity Expert, Mimecast, discusses the stark findings behind the company’s research that reveal just how important it is to ensure email security is up to scratch. The past 18 […]


With cloud, CIOs can help their organisations hit the road to net zero

Andrew Brinded, SVP EMEA Sales, Nutanix, discusses the advantages of cloud computing and its impact on the data centre industry as it distinguishes much of the complexities and inefficiencies of data centre management. The Information Technology industry hasn’t always had a great reputation when it comes to sustainability. Toxins in computers and phones caused consternation […]


Protecting from the cyber kill chain evolution

As cybercriminals ramp up their approach, organisations must implement an effective incident response plan to identify, analyse and mitigate attacks. Chris Vaughan, AVP – Technical Account Management, EMEA Tanium, discusses going back to basics and putting an efficient plan in place. Since the beginning of 2020, there has been an acceleration in cybercrime as criminals […]


Considering cloud migration: Strategy is king

Migrating to the cloud is now an unavoidable reality for businesses striving to put flexibility in the hands of their employees and conform to the modern way of working. Adrian Rowley, Senior Director EMEA, Gigamon, discusses the foundations that should be implemented to build a successful cloud migration strategy. As businesses evolve to a more […]


Embracing distributed Edge Computing to adapt to a new era of technology

Edge Computing is a way of storing data closer to the source and is ultimately creating efficiencies for business leaders by improving response times and saving bandwidth. James Petter, International VP, Pure Storage, discusses the importance of Edge Computing and the positive impact its having on technology development. Edge Computing has been around for a […]


Proactively preventing cyberattacks and keeping the business operational with threat hunting

Sameer Basha, Security Consultant GCC, Check Point Software Technologies – Middle East, discusses the importance of using threat hunting to defend against attackers on a network, as well as how threat hunting is beneficial to operations and creates a resilient cyber infrastructure. What is threat hunting and why is it relevant to CISOs? Threat hunting […]


An Edge Computing breakup: Out with the old and in with the new

With more and more people working from home as a result of the pandemic, business leaders have been faced with Edge complexities as the scale of Edge Computing use has increased. Dave Russell, Vice President of Enterprise Strategy at Veeam, and Rick Vanover, Senior Director of Product Strategy at Veeam, discuss how Edge Computing will […]


Designing robust Business Continuity policies

The goal of a Business Continuity policy is to document what is needed to keep an organisation running on ordinary business days as well as times of emergency. When the policy is well-defined and clearly adhered to, the company can set realistic expectations for Business Continuity and Disaster Recovery processes. Industry experts share insights with […]


Disaster planning in the wake of increased threat vectors

Typically, Disaster Recovery planning involves an analysis of business processes and continuity needs. Before generating a detailed plan, an organisation often performs a business impact analysis (BIA) and risk analysis (RA), and it establishes recovery objectives. Industry pundits share with us insights and look at a step-by-step plan, precautions organisations should take to minimise the […]


Five key trends shaping firms’ digital journeys as the transformation drive accelerates

With the disruption brought about by the Coronavirus pandemic forcing organisations to digitise, Ian Fairclough, Vice President, EMEA Customer Success, Mulesoft, identifies five key developments that are shaping organisations’ digital journeys as they continue to address the pressures of Digital Transformation. The urgency and disruption of the COVID-19 pandemic has led to organisations facing more […]