When disaster strikes
Many IT organisations have had the same data protection tools and practices for years, even decades, and see no need for that to change. But Application Owners need to know that they’ll be able to recover their...
Many IT organisations have had the same data protection tools and practices for years, even decades, and see no need for that to change. But Application Owners need to know that they’ll be able to recover their...
Internet Explorer, Microsoft’s ubiquitous web browser that remains one of the most used internet browsing applications worldwide, has topped a list of the most frequently targeted Windows components. Prepared by...
Sean Mason, Vice President of Global Customer Success, Resolution1 Security, discusses major information security themes for this year and advises enterprises to draw up the following New Year resolutions....
Cherif Sleiman, General Manager, Middle East at Infoblox, discusses recent notable DNS attacks and preventable solutions to help deflect potential threats. The Etisalat website was hacked into on Thursday, 18th...
According to Roger Hockaday, EMEA Director, Ruckus Wireless, WiFi is the perfect solution for the data challenges that are coming from a worldwide infatuation with and insatiable demand for better wireless data...
Chester Wisniewski, Senior Security Consultant, Sophos, takes us through how small and medium-sized businesses can benefit and improve business efficiency from cloud-based security. Most vendors seem to assume that...
Signup to the Intelligent CIO Middle East newsletter and never miss out on the latest news