Feature

Hasanian Alkassab, Senior Regional Security Manager, GBM.

Risk-based approach to security management

Many CIOs struggle with the preservation of confidentiality, integrity, and availability of data utilised in business processes, applications, and technology. To realise these security objectives, a holistic and integrated approach is required
3 years ago
Nicolas Khoury, Senior DevOps and Security Engineer, CME.

Four steps to cybersecurity in healthcare sector

Modern healthcare is, as a digitised sector, faced with numerous cybersecurity problems. In addition to potential malware infections, private data leakages, and service attacks, it is also possible for application, configuration, and
3 years ago
Sebastien Pavie, Regional Vice President for Cloud Protection and Licensing activities at Thales.

Time to review security quantum strategy

The post pandemic phase of 2021 has been characterised by huge organisational investments into networks, employee access, cloud data orchestration, remote collaboration, supply chain and supplier management, transformation, amongst others. In parallel,
3 years ago
Shoaib Yousuf, Partner, Boston Consulting Group.

Existential, strategic, operational risks loom ahead

Organisations must ensure they avoid scenarios that break regulatory compliance by failing to ensure legally mandated data protection, reputational and financial risk that result in negative publicity for the organisation. Understandably, the
3 years ago
Wael Mustafa, Area Vice-President for MESAT, Commvault.

Modern approach to traditional data backup solutions

Commvault recently launched its award-winning Metallic Backup-as-a-Service, BaaS, solutions in the UAE and wider Middle East region. The solutions include Metallic’s enterprise-grade offerings including Metallic Office 365 Backup and Recovery, Metallic Endpoint
3 years ago
Vincent Berk, CTO and Chief Security Architect. Riverbed.

Increasing visibility and incident response

NetProfiler and AppResponse are both full fidelity products that, respectively, capture and retain every flow record and every packet for anomaly detection and forensic analysis. As we are faced with new and evolving
3 years ago
1 36 37 38 39 40 54

Categories