
PC.com
Acer Veriton Z - A Perfect Business Solution?
The Acer Veriton Z comes in a box which looks like it only holds the monitor.
3 min |
March - April 2019

Security Advisor Middle East
Winning The Cyber Arms Race
Michael Berg, Executive Director, Emea Sales, Sonicwall, Sits Down With Security Advisor Me to Discuss the Company’s Continuous Commitment to the Region and Shares His Views on How the Security Space Will Evolve in 2019.
3 min |
January 2019

Security Advisor Middle East
Silver Linings
The cloud has undeniably become one of the most overhyped technologies in decades and rightly so.
1 min |
January 2019

Security Advisor Middle East
Why Security In The Connected Workplace Is Everyone's Business
There was a time when cyber security was limited to a desktop computer with antivirus software.
4 min |
January 2019

Security Advisor Middle East
Risky Business
The Cloud Is Everywhere Today. However, Many Organisations as Well as Individuals Still Don’t Fully Trust the Nature of the Cloud. Security Correspondent Daniel Bardsley Speaks to Experts About the Risk Perception and Privacy Challenges of the Cloud.
4 min |
January 2019

Security Advisor Middle East
How To Close The Cybersecurity Gap In The Digital Era
What’s stopping global businesses from protecting their assets despite significant investments in cybersecurity programmes?
3 min |
January 2019

Security Advisor Middle East
Premium Protection
As the Threat Landscape Continues to Grow, the Fight Between Organisations and Cybercriminals Can Often Feel Like a High-stakes Cat-and-mouse Game. To Reduce the Impact of Cyber-attacks and Data Breaches, Companies Today Need to Be Financially Prepared and Having a Cyber Insurance Makes Smart Business Sense, Security Correspondent Daniel Bardsley Reports.
5 min |
January 2019

Security Advisor Middle East
Mine Of Information
No one needs to be told that the cyber threats facing businesses today are both numerous and diverse, ranging from data breaches to ransomware to distributed denial of service attacks.
5 min |
January 2019

Security Advisor Middle East
Cutting Through The Noise
Amit Roy, Executive Vice President and Regional Head, Emea, Paladion, Discusses How Organisations Can Speed Up Incident Detection and Response Amid Growing Volumes of Threat Data.
2 min |
January 2019

Security Advisor Middle East
Eagle Eye
Building on Its Legacy as a Player in the It Infrastructure Market, Norden Communications Me Is Developing Its Presence in the Surveillance Market With Its Eyenor Range of Products. General Manager Joseph K John Sits With Security Advisor Me and Delves Into the Latest Trends Driving the Physical Security Market.
3 min |
January 2019

HWM Singapore
5 Features Of Samsung's One UI That Are Better Than Stock Android
Samsung has come a long way from the days of TouchWiz. Its latest UI, simply called One, is a clean, lightweight experience that offers many features that you won’t find in stock Android 9.0 Pie. One UI is available now for the Samsung Galaxy S10, S10+, S9, S9+, Note9, and Note8.
2 min |
April 2019

Security Advisor Middle East
You've Got Mail!
AS AN INTEGRAL COMMUNICATION AND COLLABORATION TOOL FOR ANY ORGANISATION ACROSS THE GLOBE, EMAIL REMAINS AN ATTRACTIVE ATTACK VECTOR FOR CYBERCRIMINALS. HUSNI HAMMOUD, GENERAL MANAGER, MIDDLE EAST, CEE AND TURKEY, BARRACUDA NETWORKS, DISCUSSES HOW ORGANISATIONS CAN STAY ONE STEP AHEAD OF THE BAD GUYS.
3 min |
March 2019

Security Advisor Middle East
Shifting Threats Push Businesses To Rethink Security Priorities
THREAT REPORT REVEALS SIGNIFICANT INCREASE IN PHISHING, CRYPTOCURRENCY MINING AND BEC ATTACKS
2 min |
March 2019

Security Advisor Middle East
Set For Growth
WITH A MISSION OF DELIVERING HIGH VALUE SECURITY OFFERINGS, GULF IT DISTRIBUTION IS COMMITTED TO ITS “PARTNER-FOCUSED AND CUSTOMERCENTRIC” STRATEGY. THE TEAM AT THE UAE-BASED VAD – FERAS AL HAKIM, CHANNEL MANAGER; ANEEZ ABBAS, CHANNEL SALES MANAGER - UAE; AND LOAI AHMAD MAHMOUD JAMOUS, COUNTRY MANAGER - SAUDI ARABIA – SAT DOWN WITH SECURITY ADVISOR ME TO DISCUSS HOW THEY ARE PRIMED TO ADDRESS THE GROWING SECURITY DEMANDS IN THE REGION
3 min |
March 2019

Security Advisor Middle East
Safe Space
SMART CITIES AND THE TECHNOLOGIES WITHIN THEM WILL BRING A PLETHORA OF BENEFITS AND TRANSFORM THE WAY WE LIVE AND WORK. HOWEVER, IT CAN BE A DOUBLE-EDGED SWORD, AS WITH THE BENEFITS COME A SERIES OF SECURITY RISKS. GENETEC REGIONAL DIRECTOR FOR META FIRAS JADALLA DISCUSSES HOW THE COMPANY CAN MAKE SMART CITIES SAFE.
2 min |
March 2019

Security Advisor Middle East
Don't Take The Bait
Data breaches, cyber threats and attacks, have dominated media headlines over the past couple of years.
1 min |
March 2019
Security Advisor Middle East
Breached Or Not Breached?
AS CYBERCRIMINALS BECOME SMARTER AND CYBER-ATTACKS GROW IN SOPHISTICATION, THE GULF REGION IS INCREASINGLY BECOMING AN ATTRACTIVE TARGET TO CYBERCRIMINALS. HANI NOFAL, VICE PRESIDENT, INTELLIGENT NETWORK SOLUTIONS, SECURITY AND MOBILITY, GULF BUSINESS MACHINES, SHARES TOP INSIGHTS ON HOW ORGANISATIONS CAN NAVIGATE THE REGIONAL THREAT LANDSCAPE.
5 min |
March 2019

Security Advisor Middle East
Strength In Unity
CLAUDE SCHUCK, REGIONAL MANAGER FOR MIDDLE EAST & CENTRAL AFRICA, VEEAM, DISCUSSES HOW THE POWER OF PARTNERSHIPS IS DELIVERING BUSINESS VALUE IN A WORLD OF DATA COMPLEXITY.
4 min |
February 2019

Security Advisor Middle East
Security On Point
FOR THE PAST SEVERAL YEARS, POINT OF SALE (POS) SYSTEMS HAVE BEEN A PRIME TARGET FOR CYBER-ATTACKS, MAKING IT MORE IMPORTANT THAN EVER FOR RETAILERS TO CONSIDER THE SECURITY OF THESE MACHINES AND THE INFORMATION THEY STORE.
5 min |
February 2019

Security Advisor Middle East
On Guard
AN INCONVENIENT TRUTH FACED BY ENTERPRISES TODAY IS THAT THE GROWTH OF CYBER-ATTACKS ISN’T SLOWING DOWN AND HACKERS ARE CONSTANTLY FINDING NEW WAYS TO EXPLOIT WEAKNESSES IN IT ENVIRONMENTS. EXPERTS SHARE INSIGHT ON WHY VULNERABILITY MANAGEMENT IS A VITAL PROCESS IN STRENGTHENING AN ORGANISATION’S SECURITY POSTURE.
4 min |
February 2019

Security Advisor Middle East
How To Spot Bad Apps
SECURITY CORRESPONDENT DANIEL BARDSLEY SPEAKS TO INDUSTRY EXPERTS ON HOW END-USERS CAN STEER CLEAR OF MALICIOUS MOBILE APPLICATIONS.
5 min |
February 2019

Security Advisor Middle East
Digital Front Lines
AS MILITARIES INCREASINGLY MOVE DATA TO THE CLOUD, HOW CAN GOVERNMENTS MAINTAIN THE CYBERSECURITY OF THEIR DEFENCE FORCES IN THE ERA OF DIGITISATION? SECURITY CORRESPONDENT DANIEL BARDSLEY REPORTS.
3 min |
February 2019

Security Advisor Middle East
At Your Fingertips
MOREY HABER, CTO, BEYONDTRUST, SHARES INSIGHTS INTO HOW ORGANISATIONS CAN LEVERAGE PAM FOR EFFECTIVE CYBER FORENSICS AND SECURITY BREACH REMEDIATION.
4 min |
February 2019

Security Advisor Middle East
A Clear View
ONLINE EDITOR ADELLE GERONIMO SHARES HER VIEWS ON THE LATEST DEVELOPMENTS IN THE SECURITY LANDSCAPE.
2 min |
February 2019

GQ India
Break Your Screen Addiction Now!
The best time to start breaking your screen addiction is now. Step one: Get a second phone?!
3 min |
March 2019

HWM Singapore
Apple iPad Pro 2018- The Best Tablet Money Can Buy
Apple iPad Pro 12.9-inch
4 min |
January 2019

HWM Singapore
How Computational Photography Is Letting Mobile Phones Perform Like ILCs
We take a look at three photo features that are turning up in today’s smartphones and the technology behind them to see how they’re producing ILC-like images.
3 min |
January 2019

PC.com
Take Better Selfies At Night With Google's Night Sight
Take perfect, flash-less pictures in the dark
1 min |
December 2018

Business Today Malaysia
An Ace In The Computing Sector
Much of today’s technology implies the use of computers to assist us to apply a systematic technique, method or approach to solve a problem. Technology has made us ever productive.
3 min |
December 2018

HWM Singapore
Do Macs Still Have A Future?
Or do iPads rule the roost?
2 min |