CONNECTING TECHNOLOGY SHAPING BUSINESSES
By: Injila Khan, Content Writer The world we are living in has undergone a digital transformation. While this digital revolution brings ease, it has also created...
In an exclusive interview with Integrator Media, Mr. Hesham Tantawi, Vice President at ASBIS Middle East delves into the dynamic world of ASBIS. With a remarkable...
By: Christopher Hills, Chief Security Strategist, BeyondTrust Across the Middle East, CIOs and CISOs huddle together to determine ways of making their organizations more secure so...
In August 2024, Proofpoint researchers identified an unusual campaign using a novel attack chain to deliver custom malware. The threat actor named the malware “Voldemort” based...
By: Srijith Kn The Voldemort espionage malware campaign, which has made headlines for its widespread infiltration of organizations worldwide, has raised significant concerns among cybersecurity experts....
By Saeed Abbasi, Product Manager, Vulnerability Research, Qualys Threat Research Unit (TRU) In the Arab Gulf region, ransomware has become an epidemic. Since 2019, Saudi Arabia...
By David Warburton, Director, F5 Labs The growing maturity of cloud computing, including shifts towards decentralized architectures and APIs, has highlighted the complexity of managing credentials...
ASBIS introduces AMD EPYC demo marketing server, offering high performance, scalability, and efficiency for data center applications, cloud computing, virtualization, and enterprise tasks Recently ASBIS has...
By Uday Shankar Kizhepat, Vice President and General Manager- Middle East and Africa Region, WSO2 We live digitally. Much of our professional work is digital, as...
Cloud data ecosystems are the way forward for both industrial enterprises and the technology providers that support them, says Rónán de Hooge, Executive Vice President, Cloud...