Smart device hacking gets real
For years now, cyber security risk exaggerators have been talking about the threat to connected devices from hackers and other cybercriminals. But most observers have scoffed at stories of networked fridges or...
For years now, cyber security risk exaggerators have been talking about the threat to connected devices from hackers and other cybercriminals. But most observers have scoffed at stories of networked fridges or...
Paladion, a security services provider in the Middle East, has said that the fastest-growing area of cyber crime has developed into a $1 billion-a-year industry complete with customer care departments set up to secure...
The explosion of smartphones and tablets is transforming the way we communicate, work and manage our personal lives. We stay connected everywhere, and collaborate on the go at every opportunity we get. We need the...
As adoption of wearables becomes more mainstream in the Middle East, it brings added complexity to BYOD in an enterprise. One of the more interesting features of wearable tech is its ability to tether to, and control,...
In May this year, we posted results of our ‘network protection survey’, which looked – among other things – at best practices in companies that were highly successful at network security. I will drill down into these best prac...
C suites around the world are buzzing about digital transformation. But here’s the truth: A huge number of business processes still run on paper. More than three-quarters of global professionals are reliant on paper at w...