Blogs

Six immediate issues looming in US post-election era

Republican candidate Donald Trump was elected as the next US president on 9 November. His rival, Democrat Hillary Clinton, conceded the election overnight. Narrow margins separated the two candidates in many states,...

After finance cyber threat actors turning to healthcare

Financial data, such as payment card information, has many established markets. The going price for a single record of information, full package of an individual’s identifying information, with names, social...

Cybercrime now influencing choice of a nation’s leader

To say that the 2016 US Presidential election cycle has been unusual would be an understatement for a number of reasons. As a security professional, what stands out is the steady stream of cyber security-related...

IoT vendors can no longer ignore security compliance

On 4 November 2016, it was reported that the entire internet infrastructure of the African nation of Liberia had been knocked off-line after it was targeted by hackers using the same weapon that caused the largest...

Right storage strategy as critical as data strategy

Data storage is as old as written language itself. We may use silicon microchips now, but once upon a time, data storage meant writing information by hand onto scrolls of parchment. Floppy disks and hard disk drives...

Mitigating BYOD security threats

The concept of bring your own device BYOD continues to be a growing trend for businesses around the world and the Middle East is certainly not lagging behind. The region is notably an early adopter of the most...

Browse our latest issue

Intelligent Tech Channels

View Magazine Archive