Blogs

Time for your New Year cyber detox?

The Festive period is over, the mince pies, turkey and other excesses are finished for another year and we start the New Year with hope and optimism and often New Years resolutions. Equally, in the corporate world, we...

DDoS defence: Is your network protected?

Distributed denial of service (DDoS) attacks are growing in both size and sophistication. Recently in September, a pair of high-profile DDoS attacks reached more than 600 Gbps and 1 Tbps, respectively, ranking among the l...

Cloud and the silver lining

Just as writing has come to mean texting, blogging, or any form of digital writing, the cloud today means one or all of the three Cs: computing, connectivity, and communication. And just as nearly all thought to...

Inconvenient truth of hidden conflict in the C-suite

A little bit of conflict between members of the C-suite is inevitable. When each member has different priorities and business objectives to the rest of the C-suite, it’s possible for this conflict to cause problems. P...

4 opportunities afforded by an ADC refresh

An application delivery controller (ADC) refresh is a great occasion to look to the future and optimise your network for not only the applications you have in place today, but what you will have tomorrow. Odds are the box y...

Why DNS shouldn’t be used for data transport

Malicious DNS tunnelling is a big problem in cyber security. The technique involves the use of the Domain Name System (DNS) protocol to smuggle sensitive corporate or personal information out of a network, and to enable...

Browse our latest issue

Intelligent CIO Middle East

View Magazine Archive