Find

September 9, 2020

SASE is all about delivering security everywhere

SASE is designed to help organizations secure these new distributed networks. However, as with any emerging technology category, there is still some uncertainty about what precisely a SASE solution means—and what technologies are included. In addition, vendors are attempting to redefine this market in ways that best reflect their current offerings
by | 5 min read
August 31, 2020

COVID-19 will foster much needed collaboration in the future of work

Before the outbreak of the virus, many businesses had been experiencing lost productivity, highlighting a need for change. While the problem can’t be fixed with one solution alone, workplace teamwork is vital to not only improving productivity but also fostering creativity and problem-solving, ultimately leading to better employee retention and more successful business outputs.
by | 4 min read
August 30, 2020

Gamification as a strategy in the post-pandemic e-learning boom

Gamifying the onboarding process was a hot trend during 2019 with many organizations opting to step away from traditional processes where new recruits are expected to steadily wade through obligatory information files.
by | 3 min read
August 25, 2020

IoT in 5G Network – Research by Jayakumar. S PhD – Part 2

The expansion of smart sensors usage is being hindered by the lack of a universal standard, especially in the wireless region. Recognizing that no single sensor bus or network is likely to dominate in the foreseeable future
by | 6 min read
August 19, 2020

The novel coronavirus has reset norms for brand engagement and marketing

Marketing transformation takes on a new sense of urgency, requiring true 360 customer understanding and engagement, at every stage, from discovery to engagement to retention and loyalty to advocacy.
by | 2 min read
July 1, 2020

Vectra AI released its 2020 Spotlight Report on Healthcare

Vectra investigated network behaviors that are consistent with threats across the entire cyberattack lifecycle – botnet monetization, command and control, internal reconnaissance, lateral movement, and data exfiltration. Upon closer examination, these behaviors were found to be from cloud migration activities, and not attackers.
by | 2 min read
July 1, 2020

Dell Technologies introduces a broad portfolio of Industrial Touchscreen displays

With the addition of faytech’s wide range of industrial displays, Dell Technologies can now offer customers fit for purpose screens which covers a variety of applications, from small Point of Sales (POS) and midsize Human Machine Interface (HMI) screens up to large format displays for dashboarding and collaboration.
by | 2 min read
June 18, 2020

Announcing CN-Series: The industry’s first NGFW for Kubernetes

By: Mukesh Gupta, Vice President of Product Management at Palo Alto Networks. As the risk and compliance needs of the container environments increase, network security teams need to secure Kubernetes environments with the same rigor used to protect the rest of the infrastructure.
by | 4 min read
June 5, 2020

Egyptian B2B e-Commerce marketplace Closes $6.2 Million Seed Round

MaxAB, an Egyptian B2B e-commerce marketplace that connects informal food […]
by | 2 min read
June 3, 2020

An entrepreneur’s guide to COVID-19 tech news in May

Across the globe, the month of May saw a wide […]
by | 12 min read