Blogs

IoT vendors can no longer ignore security compliance

On 4 November 2016, it was reported that the entire internet infrastructure of the African nation of Liberia had been knocked off-line after it was targeted by hackers using the same weapon that caused the largest...

Right storage strategy as critical as data strategy

Data storage is as old as written language itself. We may use silicon microchips now, but once upon a time, data storage meant writing information by hand onto scrolls of parchment. Floppy disks and hard disk drives...

Mitigating BYOD security threats

The concept of bring your own device BYOD continues to be a growing trend for businesses around the world and the Middle East is certainly not lagging behind. The region is notably an early adopter of the most...

Mobile tickets soon the norm at spectator events

The rapid growth in smartphone usage is set to increase with the advent of electronic ticketing for sporting and entertainment events. Mobile ticketing is nothing new, especially in the transport industry where users...

Enterprises responsible for their cloud security

Security has long been the principal fear that weighs on cloud investments. While perceptions are improving, Intel Security’s recent State of Cloud Adoption study found that data breaches remain the biggest...

Improving enterprise log-ons with tap authentication

With the move to a mobile and cloud first world, corporate data has become increasingly difficult to protect. Employees’ expectations have changed too, they want to be able to access corporate cloud...

Browse our latest issue

Intelligent Tech Channels

View Magazine Archive