Blogs
Get your sK8s on — top tips for Kubernetes and container data protection
Core business applications are increasingly reliant on containers, meaning demand for data protection and backup using Kubernetes is increasing. Fred ...Millions lost to ransomware. What is the solution?
Saket Modi, Co-founder & CEO, Safe Security elaborates on a solution for ransomware. In 2021, we observed a resurgence of ...Critical role of data centers during and after pandemic
In this exclusive piece, Antoine Harb, Team Leader Middle East and North Africa at Kingston Technology writes on the important ...How the pandemic is accelerating the pace of digital transformation for a hyperconnected industrial world
Ravi Gopinath, Chief Cloud Officer and Chief Strategy Officer at AVEVA As the world begins to recalibrate itself after the ...Small business digital transformation starts with business-grade Wi-Fi
Jacob Chacko Regional Business Head – Middle East, Saudi & South Africa (MESA) at HPE Aruba elaborates on the importance ...Defending applications from complex and modern attacks
Rajiv Kapoor, Senior Product Marketing Manager, NGINX at F5 elaborates on DoS attacks and precautions that need to be taken ...2022: A cybersecurity odyssey
F5 Labs (and friends) 2022 will be eye-catching year for cybersecurity incidents, fallouts, and innovations. To make sense of it ...The new security demands of our hybrid working future
Ram Narayanan, Country Manager, Check Point Software Technologies, Middle East, elaborates on the new security demands. For technology leaders around ...Moving beyond zero trust – a practical approach to proliferating ransomware
Gregg Petersen, Regional Director – MEA at Cohesity elaborates on how Zero Trust is now no longer sufficient, but rather ...5 reasons why you need zero trust architecture
Amr Alashaal, Regional Vice President – Middle East at A10 Networks elaborates on the need to adapt zero trust architecture. ...