When disaster strikes
Many IT organisations have had the same data protection tools and practices for years, even decades, and see no need for that to change. But Application Owners need to know that they’ll be able to recover their data at t...
Many IT organisations have had the same data protection tools and practices for years, even decades, and see no need for that to change. But Application Owners need to know that they’ll be able to recover their data at t...
Internet Explorer, Microsoft’s ubiquitous web browser that remains one of the most used internet browsing applications worldwide, has topped a list of the most frequently targeted Windows components. Prepared by ESET, t...
Sean Mason, Vice President of Global Customer Success, Resolution1 Security, discusses major information security themes for this year and advises enterprises to draw up the following New Year resolutions. We live in a...
Cherif Sleiman, General Manager, Middle East at Infoblox, discusses recent notable DNS attacks and preventable solutions to help deflect potential threats. The Etisalat website was hacked into on Thursday, 18th December ...
According to Roger Hockaday, EMEA Director, Ruckus Wireless, WiFi is the perfect solution for the data challenges that are coming from a worldwide infatuation with and insatiable demand for better wireless data...
Chester Wisniewski, Senior Security Consultant, Sophos, takes us through how small and medium-sized businesses can benefit and improve business efficiency from cloud-based security. Most vendors seem to assume that...