“Business transformation is happening at a rapid pace, so companies need infrastructure that performs with the velocity and scale to handle changing workplace needs—in modern...
By – Ram Narayanan, Country Manager at Check Point Software Technologies, Middle East Supply chain attacks aren’t new. If the past couple of years have...
By – Ram Narayanan, Country Manager at Check Point Software Technologies, Middle East Supply chain attacks aren’t new. If the past couple of years have...
By: Jacob Chacko, Regional Director – Middle East, Saudi & South Africa at Aruba, a Hewlett Packard Enterprise company No matter the sector, all have...
By Barbara Maigret, Global Head of Sustainability and CSR at Fortinet Our society faces significant challenges that must be addressed quickly to prevent disruptions that...
By: Mohamed Mikou, Chief Operating Officer & Chief Marketing Officer: Microsoft Middle East & Africa Not too long ago, we would leave our offices at...
By: Kevin Jones, VP Public Sector, Virsec The US-based CISA recently announced a major patching directive, but an optimal security strategy should begin from the...
By Gareth Smith, GM, Software Test Automation Keysight Technologies, Inc. Organizations are increasingly embracing intelligent automation to deliver efficiencies and free up resources. These solutions...
David Brown from Axon Technologies explains how certain measures such as digital footprints and network segmentation are often overlooked – resulting in breaches – enforcing...