Insights

When disaster strikes

Many IT organisations have had the same data protection tools and practices for years, even decades, and see no need for that to change. But Application Owners need to know that they’ll be able to recover their data at t...

Internet Explorer ‘most vulnerable’ Microsoft Windows component

Internet Explorer, Microsoft’s ubiquitous web browser that remains one of the most used internet browsing applications worldwide, has topped a list of the most frequently targeted Windows components. Prepared by ESET, t...

New Year resolutions for IT security

Sean Mason, Vice President of Global Customer Success, Resolution1 Security, discusses major information security themes for this year and advises enterprises to draw up the following New Year resolutions. We live in a...

Defending your DNS infrastructure

Cherif Sleiman, General Manager, Middle East at Infoblox, discusses recent notable DNS attacks and preventable solutions to help deflect potential threats.  The Etisalat website was hacked into on Thursday, 18th December ...

A perfect wireless storm

According to Roger Hockaday, EMEA Director, Ruckus Wireless, WiFi is the perfect solution for the data challenges that are coming from a worldwide infatuation with and insatiable demand for better wireless data...

Simple security is better security

Chester Wisniewski, Senior Security Consultant, Sophos, takes us through how small and medium-sized businesses can benefit and improve business efficiency from cloud-based security. Most vendors seem to assume that...

Browse our latest issue

Intelligent CIO Middle East

View Magazine Archive