The death of Internet privacy

Annie Bricker by Annie Bricker - March 26th, 2014

In the age of constant connection, internet users are sharing more and more sensitive information online. As hackers become more organised and the amount of data stored in the cloud increases, the potential for leaks of sensitive data becomes magnified.

SafeNet: Security fears preventing data centre and Cloud benefits

James Dartnell by James Dartnell - February 17th, 2014

Security concerns are preventing businesses from unlocking the potential benefits of data centre consolidation and cloud services, according to new research from SafeNet.

European Parliament cuts Wi-Fi after French researcher hacks email accounts

John E Dunn by John E Dunn - December 2nd, 2013

The European Parliament has cut access to its public Wi-Fi network after detecting a man-in-the-middle attack on a number of email accounts apparently carried out by a white hat researcher out to expose poor security at the institution.

SafeNet to exhibit world’s first Crypto Hypervisor

James Dartnell by James Dartnell - October 13th, 2013

Safenet claims to have invented the world’s first Crypto Hypervisor, and it will unveil the technology at next week’s GITEX trade show as part of its “secure breach” strategy.

Security-as-a-Service: IT’s Dark Knight?

Joe Lipscombe by Joe Lipscombe - August 13th, 2013

As hackers and attackers wreak havoc on the industry, businesses have been looking for a watchful protector to secure their assets. Is security-as-a-service the IT industry’s Dark Knight?

Oracle and Salesforce.com’s love-fest: The ripple effects

Chris Kanaracus by Chris Kanaracus - July 25th, 2013

While certain recent announcements weren’t as “startling” as Oracle CEO Larry Ellison had promised they would be, its deal with Salesforce.com definitely lived up to the hype and could have some lasting ramifications.

Ticking time bomb

Tom Paye by Tom Paye - June 11th, 2013

The last year has shown more than ever how careful businesses need to be with their data. However, recent reports suggest that only a fraction of Middle Eastern enterprises have data loss prevention …

Target located

Joe Lipscombe by Joe Lipscombe - May 22nd, 2013

In 1971, John Draper used a whistle, found in a cereal box, to reproduce a 2,600 Hz tone able to allow phreaks to make free calls – wire fraud was born. This was …

The security guide to BYOD

Ben Rossi by Ben Rossi - April 9th, 2013

There’s no use in trying to resist it – BYOD is here to stay. To help in the transition, CNME rounds up tips from the security industry on how to cope with the …

Eye of the storm

Joe Lipscombe by Joe Lipscombe - March 5th, 2013

Experts recently pointed towards security as the main obstacle for adoption of all cloud types and claimed that cloud security will be the main disruptive technology for 2013. But the Middle East has …

Losing the battle

Joe Lipscombe by Joe Lipscombe - January 22nd, 2013

Security shot up the priority list of not just CIOs but also higher management in 2012 as the world witnessed the effects of countless breaches on top organisations. As a fresh year presents …

Keeping secure? Virtually impossible

Joe Lipscombe by Joe Lipscombe - December 18th, 2012

The last 12 months has seen an incredible transformation from traditional IT towards a new, digitalised world which has begun to redefine the industry entirely. One of the key trends was the virtualisation …

Security digital identities

Contributor by Contributor - November 4th, 2012

In today’s digital world, the identity of users is defined by their digital credentials. The ability to demonstrate their identity, or authenticate, should be a simple and straightforward action – but surprisingly, it’s …

Clouded with uncertainty

Ben Rossi by Ben Rossi - September 11th, 2012

The migration of enterprise applications to cloud infrastructure is becoming more and more of an inevitability. But whilst private cloud and hybrid implementations in the Middle East are picking up, views towards the …

GITEX Preview: SafeNet

Joe Lipscombe by Joe Lipscombe - August 30th, 2012

1. What are your company’s key products and services? SafeNet is the largest company in the world exclusively focused on the security and protection of high value information, intellectual property and digital identity. …

A new era

Ben Rossi by Ben Rossi - July 4th, 2012

With the advent of the BYOD phenomenon, the amount of threats businesses face have multiplied on an unprecedented scale. Ben Rossi looks at how these trends have rapidly changed the enterprise security landscape …

SafeNet acquires Cryptocard

Ben Rossi by Ben Rossi - March 13th, 2012

SafeNet has acquired Cryptocard, a privately held leader of cloud based authentication solutions, in a move to broaden its authentication and cloud services. The acquisition, of which the fee was not disclosed, enhances …

Encryption made easier with new key management tools

CNME Staff by CNME Staff - September 10th, 2009

In response to dramatic and widely publicized losses of data over the last few years, IT execs are moving to deploy encryption in every corner of the enterprise. While encryption does reduce the …

I(TS)2 designated as a qualified security assessor for PCI audits certification

CNME Staff by CNME Staff - March 16th, 2009

IT Security Training & Solutions – I(TS)2, the Middle East’s premier provider of integrated Security Education & Certification Curriculum, Security Solutions, Security Consultancy and Managed Security Services, today announced that it has been …

Managing software assets

CNME Staff by CNME Staff - February 11th, 2009

The current climate of company mergers and downsizing is putting CIOs under pressure to keep the lid on software costs which now account for nearly a third of the average IT budget. Add …

Cloud 360 Roadshow 2014 - Doha, Dubai, Riyadh Cloud 360 Roadshow 2014 - Doha, Dubai, Riyadh
  • Review: Samsung Galaxy Note 3

    They say that good things come in small packages—diamond rings, the crown jewels, keys to an exotic villa. When it comes to the Samsung Galaxy Note 3, big is beautiful, writes James Dartnell.

  • Acer takes on the Nexus 7 with 7.9″ Intel tablet

    The new A1-830 tablet ticks all of the right boxes for people interested in a functional tablet sporting the sub 8-inch form factor. The tablet sports a 7.9-in, 1024×768 resolution screen at a 4:3 screen ratio; ideal for web browsing and reading e-books.

  • Battle of the fives: Samsung Galaxy S5 vs. Apple iPhone 5S vs. Google Nexus 5

    Samsung officially unveiled the Galaxy S5 on Monday at a Mobile World Congress presentation in Barcelona, touting a slimmed-down approach to the latest flagship’s feature set and simplified design.

Copyright 2014 Computer News Middle East. All rights reserved. Product of CPI Media Group. For more information e-mail us at webmaster@cpimediagroup.com. Privacy Policy