Blogs
Assume compromise: new security fundamentals for the new threat era
In this exclusive opinion piece, Ammar Enaya, regional director – METNA, Vectra AI, discusses the importance of advanced threat detection & response. ...The definition and examples of Exploit Kits
Aamir Lakhani, Global Security strategist and researcher at Fortinet, elaborates on various kinds of exploit kits. In cybersecurity terminology, an exploit is ...Key business risks behind the Internet of Things
Joe Robertson, Director of information security and EMEA CISO at Fortinet elaborates on the risks of IoT. Digitization is transforming how businesses ...Mobility and SD-WAN: Is SD-WAN the super glue that will bring 5G and all the ...
Jacob Chacko, Regional Director – Middle East, Saudi & South Africa at Aruba, a Hewlett Packard Enterprise company elaborates on the adoption ...The 3 key IT trends to look out for in 2022
Sherifa Hady, Vice President Channel, Europe Middle East & Africa at Aruba, a Hewlett Packard Enterprise company gives 3 key IT trends ...Infor: Top 5 technology predictions for 2022
Amel Gardner, Vice President and General Manager, Middle East & Africa, Infor, offers five technology predictions for the year ahead. With the ...Measuring and mitigating cyber risk
Saket Modi, Co-Founder and CEO at Safe Security elaborates on the importance of cyber security and the steps to be taken to ...5 Key principles for securing smart networks
Securing smart network is challenging but not impossible. Rick Peters, CISO Operational Technology, Fortinet elaborates on the need for it and the ...Data Privacy is a culture, not a challenge
At a time when there are lots of discussions on data privacy, Daniel Fried, GM & SVP EMEA and Worldwide Channel at ...Making profitability sustainable and sustainability profitable
Claudio Muruzabal, SAP President for Southern Europe, Middle East and Africa, elaborates on the importance of sustainability and how to make it ...



















