Analysis

How to secure the endpoint

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoints can include...

Disaster planning in the wake of increased threat vectors

Typically, Disaster Recovery planning involves an analysis of business processes and continuity needs. Before generating a detailed plan, an organisation often performs a business impact analysis (BIA) and risk...

What it means to be a cybersecurity vendor for enterprise clients: Five key...

Evgeniya Naumova, VP, Global Sales Network, Kaspersky, on the challenging market conditions and how the cybersecurity vendor is helping its enterprise customers to navigate the security challenges in tough times. The...

Huawei highlights updated cybersecurity framework at GISEC 2021

Huawei, a global provider of information and communications technology (ICT) infrastructure and smart devices, is at GISEC 2021 from May 31 to June 2, where it’s showcasing its capabilities in smart government, cloud a...

ELARABY enhances staff user experience and data optimisation with Riverbed

ELARABY Group is a developer and manufacturer of consumer electronics and home appliances in Egypt, Middle East and Africa. The company’s products are widely accepted in more than 60 countries. The group recently c...

Voice of the CISO 2021 report: UAE CISOs feel unprepared to cope with a...

Proofpoint, a cybersecurity and compliance company, has released its inaugural 2021 Voice of the CISO report which explores key challenges facing chief information security officers (CISOs) after an unprecedented 12...

Browse our latest issue

Intelligent CIO Middle East

View Magazine Archive