Good identity hygiene & analytics are key to cloud security
Mohammed Al-Moneer, Regional Director, MENA at A10 Networks discusses the importance of cloud security in an era of increasing cloud adoption combined with a volatile cyber space.Read More…
Mohammed Al-Moneer, Regional Director, MENA at A10 Networks discusses the importance of cloud security in an era of increasing cloud adoption combined with a volatile cyber space.Read More…
Rajesh Gopinath, VP – Sales Engineering, MEA. at Paladion discusses the need to substantially reduce dwell time to prevent a successful breach.Read More…
Security writer at ESET, Tomas Foltyn, discusses the dangers of poor password practices.Read More…
Morey Haber, Chief Technology Officer, BeyondTrust explains how it is critical for organizations to regularly practice and role play their response to cyber attacks. This he explains, is key to an effective incident response. Read More…
Guest written by Lukas Stefanko, Malware Researcher at ESET explaining the need to know what to watch out for cryptocurrency scams on Android platform.Read More…
Sachin Bhardwaj, Director Marketing & Business Development, eHosting DataFort speaks about the role that a cloud service provider can play in helping end user organizations migrate their workloads from on-premises to the cloud through jointly engaging in a proof of concept.Read More…
Mathew Thomas, Managing Director, Middle East, Turkey and East Africa, HP elaborates on the importance of partnering with the relevant authorities in the fight for counterfeit print products, which has become a growing problem for print markets in the region. He emphasizes that consumers must stay vigilant and avoid counterfeits byRead More…
The General Manager for Gulf, Saudi Arabia & East Africa at Lenovo, Mohammed Hilili discusses the journey from personal computers to personalised computing and the how AI is going to impact our lives. If you were around in the 1980s when the first PCs appeared, you’ll remember how we marveled atRead More…
With less than two months to become compliant with the European Union’s General Data Protection Regulation (GDPR), the CEO of UAE-based IT infrastructure and information management consultancy and solutions provider Condo Protego, Andrew Calthorpe outlines a 3-step process for GDPR compliance.Read More…
Miguel Ángel Mendoza, Security Researcher at ESET talks about some security aspects users should look at in a home network ―particularly those related to the configuration of its internet-connected router.Read More…
The guest written article contributed by the security writer at ESET, Tomas Foltyn discusses the security concerns persist as the major oil and gas industry players have experienced loss of confidential data or OT disruption.Read More…
Morey J. Haber, Chief Technology Officer, BeyondTrust provides five recommendations that can help organizations improve their cyber defenses against ransomware attacks. Read More…
Copyright © 2026 - Zarks Media. All rights reserved
Stay ahead of the digital revolution in the Middle East & Africa