Blogs

Protecting digital infrastructure using robot hunters and deception...

The convergence between operational and digital technologies is well underway, being driven by the use cases around Internet of Things. Digitally enabling both new and old machines, devices, sensors, and other objects...

Expanding networks and the gigabit society

The boundaries between networks are disappearing. Local data networks in companies, datacentre networks, cellular phone networks, wide-area networks, and access networks will barely be considered as separate units in...

Calculating your security spending through digital risk management

Cyberattacks on businesses are now weekly news as breaches of data are announced regularly. However, until recently many corporate executives did not understand or share the view of its importance of addressing digital...

Security policies need to be mapped to business outcomes

Cybersecurity is no longer just an IT problem. As digital business evolves to include ecosystems and the open digital world, cybersecurity needs to evolve from a back-office IT problem to an enterprise-wide business co...

Stress testing your DevOps environment

The digital transformation process driving growth in today’s cutting-edge enterprises, owes much of its success to applications, and DevOps continuous delivery practices play a key role in the delivery of that...

Grassroot approach required for creating GCC digital skills

According to LinkedIn’s Industry Talent Report from September 2017, employment of information technology and services industry professionals in the United Arab Emirates grew by 9.6% over the past year, with most p...

Browse our latest issue

Intelligent Tech Channels

View Magazine Archive