Industry Expert

Data breaches: 10 steps to stop attackers penetrating your perimeters

As highlighted in the 2017 Verizon Data Breach Investigation Report (DBIR), 75% of attacks come from the outside and a whopping 81% of hacking-related breaches leveraged either stolen and/or weak passwords. While the...

Cyber Security Alert: Should you fear the reaper?

By Mohammed Al-Moneer, Regional Director, MENA at A10 Networks Move over Mirai. There’s a new monstrous botnet in town. The newly-discovered botnet, dubbed ‘Reaper’ or ‘IoTroop’ appears to be a more powerful strain of Internet ...

Veeam expert on the barriers to digital transformation in ME

Rick Vanover, Director of Technical Product Marketing and Evangelism at Veeam Software, tells Intelligent CIO what he believes are the current barriers to digital transformation in the Middle East and how...

SecureWorks talks ransomware, cyber fraud and social engineering

Intelligent CIO caught up with Gopan Sivasankaran, SecureWorks’ Security Architect at this year’s GITEX Technology Week to discuss the evolving cyberthreats targeting organisations, and individuals, today....

Kodak Alaris expert on overcoming the barriers to digital transformation

Gregoire de Clercq, EMEA Marketing Director, Kodak Alaris Information Management, tells Intelligent CIO what he believes are the current barriers to digital transformation in the Middle East and how these...

Microsoft Gulf expert on overcoming the barriers to digital transformation

Necip Ozyucel, Cloud and Enterprise Business Solutions Lead, Microsoft Gulf, tells Intelligent CIO what he believes are the current barriers to digital transformation in the Middle East and how can CIOs overcome...

Browse our latest issue

Intelligent CIO Middle East

View Magazine Archive