Technology

Top 10 tips to protect your privacy and safety during the online shopping season and beyond

By Chester Wisniewski, Director, Field CTO Use an ad blocker - Advertisements...

Veeam Extends Data Freedom for Customers with Support for Proxmox VE

New addition to the Veeam Data Platform will be...

Nutanix Simplifies Management and Operations of Kubernetes Clusters Anywhere to Speed Innovation

Nutanix Kubernetes® Platform enterprise-ready cloud native stack helps customers...

A Look at the Direct and Indirect Financial Drivers of NaaS

By: Jacob Chacko, Regional Director - Middle East, Saudi & South Africa at Aruba, a Hewlett Packard Enterprise company The mainstream adoption of cloud has...

Biometric Authentication – A Cure for the Common Password

By Debra Miller - Digital Marketing Communications Manager, HID From 2019 through 2021, nearly 1,900 healthcare data breaches of 500 or more records have been reported to the...

Young Leaders share their T3 Leadership Programme experience

Programme participants talk of developing strong ties with peers for future collaborations The T3 Leadership Programme for Young Leaders in the Middle East currently in...

Breaking the Myths of Zero Trust Model and Understanding How it Can Protect Your Organization

By: Dave Russell, Vice President of Enterprise Strategy, Veeam Software One of the latest buzzwords in the cyber security industry is a ‘Zero Trust’ security...

The Rise of Botnet and DDoS Attacks

By: Amr Alashaal, Regional Vice President - Middle East at A10 Networks Distributed Denial of Service (DDoS) attacks have become an ongoing threat for organisations....
spot_imgspot_img

Popular articles