Guest blog: 10 security predictions for 2017

December 12, 2016 By Lauren

Mohammed Al-Moneer, Regional Director, MENA at A10 Networks offers 10 security predictions for 2017 THE CYBER landscape changes dramatically year after year. If you blink, you may miss something; whether that’s a noteworthy hack, a new attack vector or new solutions to protect your business. Sound cyber

9 simple steps to staying safe online during the festive season

November 28, 2016 By Lauren

UAE – Cybercrime is on the rise as more and more criminals are exploiting the speed, convenience and anonymity of the internet. And with the holidays nearing, cybercriminals usually target their victims using phishing emails scams that look like special offers. James Lyne, global head of

Guest blog: Best practices for remote and branch office (ROBOs) data protection

November 7, 2016 By Lauren

Gregg Petersen, Regional Director, Middle East and SAARC, Veeam Software explains why business and IT leaders need to get to grips with the unique needs of remote offices and branch offices. ———————————— WE’VE ALL heard about fantastic new data centre technologies, but all too often it looks like

Guest comment by Darkmatter: The hack of Yahoo accounts, and the 700 days it took to be discovered

September 26, 2016 By Lauren

By Eric Eifert, Senior Vice President – Managed Security Services, DarkMatter On Thursday, 22 September 22, 2016, Yahoo confirmed that hackers stole the personal data associated with at least 500 million Yahoo accounts. Details including names, passwords, email addresses, phone numbers and security questions were taken

Opinion: Intel Security opinion piece. Why enterprises need a multi-layer approach to public cloud security

September 11, 2016 By Lauren

Scott Montgomery is vice president and chief technology officer of public sector at Intel Security. He runs worldwide government certification efforts and works with industry and government thought leaders and worldwide public sector customers to ensure that technology, standards, and implementations meet information security and privacy

Guest Blog by GE Digital Wurldtech: Internet of Things – Securing gateways to connected environments

August 29, 2016 By Lauren

Guest blog by Tom Le, Executive Director, Cyber, GE Digital Wurldtech – he looks at securing connected environments. The Internet of Things (IoT) and the Industrial Internet of Things (IIoT) have transformed global communications and businesses operations. To be competitive, organizations must be connected. Gartner forecasts that 6.4

Five essential tips for keeping your e-commerce business and clients safe from hackers

August 22, 2016 By Lauren

IF YOU have an e-commerce business you may be concerned about security. Expert Dianna Labrien from has published five essential tips for staying safe… ——————————————————– Have a system in place for purging customer data The best way to ensure that your data is not vulnerable to hackers

Guest blog: 5 tips for improving company network security

August 14, 2016 By Lauren

Cherif Sleiman (pictured), General Manager, MEA at US technology firm Infoblox identifies the top 5 ways regional enterprises can combat information leaks and network hacking… IN MAY this year, we posted results of our ‘network protection survey’, which looked – among other things – at best practices in companies