Find

February 20, 2020

3 ways to avoid getting phone hacked

Mobile phones are becoming a fruitful and surprisingly easy target for hackers. It used to be that businesses issued their executives work phones that used only business applications. But today, our phones are just as likely to hold intellectual property memos as they are to be used for listening to music.
by | 4 min read
February 19, 2020

Trend Micro launches Channel Partner Program in AMEA

Underpinning the program are several key initiatives designed to help channel partners generate more margins, capture new revenue streams, and drive tighter alignment with Trend Micro in the field by taking a customer-centric approach.
by | 2 min read
February 17, 2020

Orange Egypt builds horizontal cloud on Red Hat Technologies

Orange Egypt wanted to use the latest in hybrid cloud and network functions virtualization (NFV) innovation to be able to respond in real-time to market dynamics and network conditions to best serve its customers. As part of this initiative, Orange Egypt looked to virtualize its mobile packet core, which had been running standalone functions on dedicated appliances.
by | 2 min read
February 12, 2020

Vectra empowers organizations to manage Office 365 Breaches

40% of organizations suffer from Office 365 account takeovers. As these data breaches make headlines with growing consistency, the resulting financial and reputational costs mount.
by | 2 min read
February 12, 2020

Extreme Networks investments increase in the Middle East

Extreme Networks is also placing emphasis on strengthening relationships with its regional distributors and engaging new channel partners. As a channel-centric organization, Extreme is committed to providing both VAR and MSP end-users in the META region with cloud-based, end-to-end networking solutions that meet their needs—and those of their customers.
by | 3 min read
February 10, 2020

UAE CIOs need to classify dark data for digital business success

One of the most alarming business trends is the exponential growth in data, and especially “dark data,” or data that is unquantified and likely obsolete or trivial.
by | 2 min read
February 10, 2020

Gartner CIO survey identifies key challenges for governments

Governments are struggling in many areas, following disruptions including changes in leadership, reorganizations and funding shortfalls. For many government CIOs, disruption will affect their IT budget growth, and the funding and launch of new business initiatives will suffer,” said Alia Mendonsa, senior research director at Gartner.
by | 2 min read
February 6, 2020

Unit 42, spring 2020 edition of Cloud Threat Report

43% of cloud databases are not encrypted and 60% of cloud storage systems have logging disabled. Unencrypted cloud databases can lead to data breaches, with MoviePass a recent example.
by | 2 min read
February 5, 2020

Threat actors pivot toward more targeted attacks, SonicWall

Cybercriminals are honing their ability to design, author and deploy stealth-like attacks with increasing precision while growing their capabilities to evade detection by sandbox technology,” said SonicWall President and CEO Bill Conner.
by | 3 min read
February 4, 2020

Shadow IoT devices a threat for Corporate Networks, Infoblox

Shadow IT devices are defined as IoT devices or sensors in active use within an organisation without IT’s knowledge. Shadow IoT devices can be any number of connected technologies including laptops, mobile phones, tablets, fitness trackers or smart home gadgets like voice assistants that are managed outside of the IT department.
by | 3 min read