The death of Internet privacy

Annie Bricker by Annie Bricker - March 26th, 2014

In the age of constant connection, internet users are sharing more and more sensitive information online. As hackers become more organised and the amount of data stored in the cloud increases, the potential for leaks of sensitive data becomes magnified.

State secrets

Tom Paye by Tom Paye - February 9th, 2014

What do Middle East governments need when it comes to security, and are newly formed government entities set to revolutionise the way that states think about security?

CNME Q&A: Natalya Kaspersky

James Dartnell by James Dartnell - January 8th, 2014

CNME talks to the InfoWatch CEO

Through the looking glass

Tom Paye by Tom Paye - December 10th, 2013

And it was all going so well. As vendors began to build more comprehensive cloud-based product roadmaps, Middle Eastern users were beginning to see just how cloud services can streamline their businesses. According to a Gartner report from earlier in the year, cloud adoption was due to grow monumentally in the region up to 2016. This was largely due to issues surrounding security and compliance being ironed out.

Dark skies ahead

Tom Paye by Tom Paye - September 3rd, 2013

Can the big cloud vendors work around the allegations of NSA surveillance, or is there a gloomy outlook for cloud in the region?

Security-as-a-Service: IT’s Dark Knight?

Joe Lipscombe by Joe Lipscombe - August 13th, 2013

As hackers and attackers wreak havoc on the industry, businesses have been looking for a watchful protector to secure their assets. Is security-as-a-service the IT industry’s Dark Knight?

Ticking time bomb

Tom Paye by Tom Paye - June 11th, 2013

The last year has shown more than ever how careful businesses need to be with their data. However, recent reports suggest that only a fraction of Middle Eastern enterprises have data loss prevention …

Target located

Joe Lipscombe by Joe Lipscombe - May 22nd, 2013

In 1971, John Draper used a whistle, found in a cereal box, to reproduce a 2,600 Hz tone able to allow phreaks to make free calls – wire fraud was born. This was …

InfoWatch: Saudi Arabia to invest $400m in data loss prevention

Tom Paye by Tom Paye - April 14th, 2013

According to the latest market research conducted by the InfoWatch Group, Saudi Arabia is expected to invest up to $400 million in data loss prevention (DLP) over the next five years. Saudi Arabia …

The security guide to BYOD

Ben Rossi by Ben Rossi - April 9th, 2013

There’s no use in trying to resist it – BYOD is here to stay. To help in the transition, CNME rounds up tips from the security industry on how to cope with the …

Eye of the storm

Joe Lipscombe by Joe Lipscombe - March 5th, 2013

Experts recently pointed towards security as the main obstacle for adoption of all cloud types and claimed that cloud security will be the main disruptive technology for 2013. But the Middle East has …

Ditching restrictions

Joe Lipscombe by Joe Lipscombe - January 14th, 2013

File sharing is a critical, sensitive and valuable task for companies in all verticals. It’s costly, involves patching, management, and brings complications to international transactions. Is ditching VPNs and file servers and adopting …

Keeping secure? Virtually impossible

Joe Lipscombe by Joe Lipscombe - December 18th, 2012

The last 12 months has seen an incredible transformation from traditional IT towards a new, digitalised world which has begun to redefine the industry entirely. One of the key trends was the virtualisation …

The moving target

Joe Lipscombe by Joe Lipscombe - November 26th, 2012

The advent of mobility and its infiltration on enterprise has birthed a whole new type of security risk, and as a result presented businesses with a whole new challenge for protecting themselves. With …

Racing to the top

Jeevan Thankappan by Jeevan Thankappan - November 6th, 2012

Faced with fierce competition and churn, telecom service providers in the region are forced to overhaul customer experience to stay ahead in the game. Improving customer experience remains the holy grail for most …

Combating the next generation heist

Ben Rossi by Ben Rossi - September 11th, 2012

Technology has changed all manner of scenarios – even the classic bank robbery. The days of rolling up at a city bank armed with a balaclava, a firearm and a getaway car in …

Clouded with uncertainty

Ben Rossi by Ben Rossi - September 11th, 2012

The migration of enterprise applications to cloud infrastructure is becoming more and more of an inevitability. But whilst private cloud and hybrid implementations in the Middle East are picking up, views towards the …

Cloud 360 Roadshow 2014 - Doha, Dubai, Riyadh Cloud 360 Roadshow 2014 - Doha, Dubai, Riyadh
  • Review: Samsung Galaxy Note 3

    They say that good things come in small packages—diamond rings, the crown jewels, keys to an exotic villa. When it comes to the Samsung Galaxy Note 3, big is beautiful, writes James Dartnell.

  • Acer takes on the Nexus 7 with 7.9″ Intel tablet

    The new A1-830 tablet ticks all of the right boxes for people interested in a functional tablet sporting the sub 8-inch form factor. The tablet sports a 7.9-in, 1024×768 resolution screen at a 4:3 screen ratio; ideal for web browsing and reading e-books.

  • Battle of the fives: Samsung Galaxy S5 vs. Apple iPhone 5S vs. Google Nexus 5

    Samsung officially unveiled the Galaxy S5 on Monday at a Mobile World Congress presentation in Barcelona, touting a slimmed-down approach to the latest flagship’s feature set and simplified design.

Copyright 2014 Computer News Middle East. All rights reserved. Product of CPI Media Group. For more information e-mail us at webmaster@cpimediagroup.com. Privacy Policy