Find

January 5, 2022

Data privacy is a culture, not a challenge

Too often regulations like GDPR and the EU’s more recent invalidation of Privacy Shield in 2020 are seen as barriers. This is possibly because data is the currency of the digital economy and restrictions on its use are viewed as attacks on capitalist freedoms and innovations.This is a narrow view of what the digital economy truly is though.
by News Desk | 3 min read
December 7, 2021

Top 5 festive frauds and how to avoid them

Scammers know that many are looking for bargains, are in a rush and that we might have our guard down a bit more than usual. But it's not all doom and gloom! Global Information Security is here to bring you gift of cybersecurity knowledge – practical tips that can help protect you and your family during this busy time of year.
by News Desk | 3 min read
November 16, 2021

Containers are maturing – Data protection needs to keep pace

As computing and storage rapidly move to the cloud, containers will likely become a vital technology for every modern organization. However, while container orchestration tools, such as Kubernetes are convenient for their scalability and portability, they can fall short when it comes to data protection. A major challenge is the short lifespan of containers than the data they create.
by News Desk | 4 min read
October 3, 2021

Kubernetes Will Drive up Value of IT Skills

As with any disruptive technology, Kubernetes cannot be deployed and managed without a period of education and experimentation. Businesses are in that exciting, but sometimes frustrating, phase of deploying Kubernetes where they are trying new things. The core capabilities IT teams are already seeing is the value Kubernetes bring when grouping together the containers that makes an application into logical units.
by | 4 min read
September 2, 2021

The democratisation of the workplace through edge computing

That technology is edge computing: The ability to optimise and extend the capability of cloud computing by bringing computation and data storage closer to the devices where it’s being gathered. It’s a fairly amorphous concept that has been around since the 1990s, but thanks to the pandemic, it has given rise to edge computing’s dark horse: the remote worker.
by | 3 min read
August 17, 2021

The journey from tech side project to return on investment

There are many reasons why new technologies can initially flatter to deceive. It can simply be executed in the wrong way – possibly because the skills do not yet exist to design solutions and troubleshoot problems. Digital transformation is one such example, where businesses feel held back by a lack of skills to implement new technology.
by | 5 min read
August 5, 2021

Culture is the Key Ingredient to High Performing Teams

To use an analogy, our strategy is our destination. We all plan different routes, use different modes of transport, have different experiences on the same journey. Our shared values refer to how we support each other, how we think outside the box when we hit a roadblock and how we share our progress.
by | 2 min read
August 3, 2021

Cohesity Appoints Gregg Petersen as MEA Lead

Through Cohesity's next-generation data management solutions, Petersen will focus on helping regional businesses in the UAE, Saudi Arabia, Qatar, Egypt, and South Africa to conveniently and effectively back up, manage, protect, and derive value from their data.
by | 2 min read
July 22, 2021

Ransomware reality is biting, so how do businesses bite back?

This is organised crime : It’s easy to forget that there’s a criminal behind the ransomware that makes itself at home within your business system. While it may once have been deemed something loitering on the web and only harmful if clicked on, many are starting to recognise severe, complex, and targeted nature that ransomware really has.
by | 3 min read
July 8, 2021

Technology’s evolution from background to backbone

According to Veeam’s 2020 Data Protection Trends Report, 95% of global organizations suffer unexpected outages – lasting an average of almost two hours. For High Priority applications, which account for over half of a company’s applications, one hour of downtime is estimated to cost $67,651. Application such as email, payments, websites and mobile apps, one outage costs an average of over $135,000.
by | 4 min read