According to the latest market research conducted by the InfoWatch Group, Saudi Arabia is expected to invest up to $400 million in data loss prevention (DLP) over the next five years. Saudi Arabia […]
2014 has already gone down in history as the year of the data breach. As we move into the new year, what have we learned from our past that will aid us in the futures.
In the age of constant connection, internet users are sharing more and more sensitive information online. As hackers become more organised and the amount of data stored in the cloud increases, the potential for leaks of sensitive data becomes magnified.
What do Middle East governments need when it comes to security, and are newly formed government entities set to revolutionise the way that states think about security?
CNME talks to the InfoWatch CEO
And it was all going so well. As vendors began to build more comprehensive cloud-based product roadmaps, Middle Eastern users were beginning to see just how cloud services can streamline their businesses. According to a Gartner report from earlier in the year, cloud adoption was due to grow monumentally in the region up to 2016. This was largely due to issues surrounding security and compliance being ironed out.
Can the big cloud vendors work around the allegations of NSA surveillance, or is there a gloomy outlook for cloud in the region?
As hackers and attackers wreak havoc on the industry, businesses have been looking for a watchful protector to secure their assets. Is security-as-a-service the IT industry’s Dark Knight?
The last year has shown more than ever how careful businesses need to be with their data. However, recent reports suggest that only a fraction of Middle Eastern enterprises have data loss prevention […]
In 1971, John Draper used a whistle, found in a cereal box, to reproduce a 2,600 Hz tone able to allow phreaks to make free calls – wire fraud was born. This was […]
There’s no use in trying to resist it – BYOD is here to stay. To help in the transition, CNME rounds up tips from the security industry on how to cope with the […]
Experts recently pointed towards security as the main obstacle for adoption of all cloud types and claimed that cloud security will be the main disruptive technology for 2013. But the Middle East has […]
File sharing is a critical, sensitive and valuable task for companies in all verticals. It’s costly, involves patching, management, and brings complications to international transactions. Is ditching VPNs and file servers and adopting […]
The last 12 months has seen an incredible transformation from traditional IT towards a new, digitalised world which has begun to redefine the industry entirely. One of the key trends was the virtualisation […]
The advent of mobility and its infiltration on enterprise has birthed a whole new type of security risk, and as a result presented businesses with a whole new challenge for protecting themselves. With […]
Faced with fierce competition and churn, telecom service providers in the region are forced to overhaul customer experience to stay ahead in the game. Improving customer experience remains the holy grail for most […]
Technology has changed all manner of scenarios – even the classic bank robbery. The days of rolling up at a city bank armed with a balaclava, a firearm and a getaway car in […]
The migration of enterprise applications to cloud infrastructure is becoming more and more of an inevitability. But whilst private cloud and hybrid implementations in the Middle East are picking up, views towards the […]
With space for four hard disks, the 16TB NAS Pro 4-Bay storage unit is ideal for small businesses. However, Seagate has added a couple of neat features that make the device accessible to the average file hoarder.
We took Lenovo’s Yoga Tablet 2 for a spin, and decided whether the upgraded specs justify the $250 price tag.
What’s rectangular, gold, and 18 percent thinner than a No. 2 pencil? The iPad Air 2, which Apple unveiled Thursday. Sporting subtle refinements like a Touch ID fingerprint sensor and a beefed-up iSight […]