Blogs
The Recency Bias: why over-rotating on cybersecurity is leaving gaps in disaster recovery plans
Rick Vanover, Senior Director, Product Strategy, Veeam Software and Dave Russell, Vice President, Enterprise Strategy at Veeam Software elaborates on ...Anatomy of a DDoS attack: extortion and mitigation
Ali Sleiman, Technical Director MEA at Infoblox provides readers with an understanding of DDoS attacks and provides tips on how ...SD-WAN: The Bridge to a 5G future
Jacob Chacko, Regional Director – Middle East, Saudi & South Africa at Aruba, a Hewlett Packard Enterprise company, elaborates on ...How multi-cloud application delivery is impacting ecommerce providers as they prepare for major growth
Adrian Taylor, VP of EMEA at A10 Networks elaborates on how multi cloud application delivery is impacting e-commerce providers. Ecommerce ...Assume compromise: new security fundamentals for the new threat era
In this exclusive opinion piece, Ammar Enaya, regional director – METNA, Vectra AI, discusses the importance of advanced threat detection ...The definition and examples of Exploit Kits
Aamir Lakhani, Global Security strategist and researcher at Fortinet, elaborates on various kinds of exploit kits. In cybersecurity terminology, an ...Key business risks behind the Internet of Things
Joe Robertson, Director of information security and EMEA CISO at Fortinet elaborates on the risks of IoT. Digitization is transforming ...Mobility and SD-WAN: Is SD-WAN the super glue that will bring 5G and all the ...
Jacob Chacko, Regional Director – Middle East, Saudi & South Africa at Aruba, a Hewlett Packard Enterprise company elaborates on ...The 3 key IT trends to look out for in 2022
Sherifa Hady, Vice President Channel, Europe Middle East & Africa at Aruba, a Hewlett Packard Enterprise company gives 3 key ...Infor: Top 5 technology predictions for 2022
Amel Gardner, Vice President and General Manager, Middle East & Africa, Infor, offers five technology predictions for the year ahead. ...