In the first instalment of this two-article series, Amer Owaida, Security Writer, ESET, looks at cybersecurity habits to avoid when using your computing devices. Read More...
Matthew Gardiner, Director of Enterprise Security Campaigns, Mimecast, helps businesses navigate the security implications of a memory leak in the Microsoft Access Database. Read More...
Getting security right means starting with employee devices, writes Nick Offin, Head of Sales, Marketing & Operations, Dynabook Northern Europe
Read More...
Gamal Emara, Country Manager, UAE, Aruba, a Hewlett Packard Enterprise Company, explains how edge networking has the potential to enrich student performance in the education sector. Read More...
Adrian Pickering, Regional General Manager MENA, Red Hat, discusses how regional organisations can gain competitive advantages by transforming its IT infrastructures and capabilities. Read More...
Fida Kibbi, Vice President and Head of Marketing, Communications and Sustainability & Corporate Responsibility at Ericsson Middle East & Africa, on how technology is enabling… Read More...
The second authentication factor might be a minor inconvenience, but it provides a major security boost, highlights Amer Owaida, Security Writer at ESET. Read More...