Expert Speak
-
Three Areas That Storage Administrators Can Go Wrong
Similar to all areas of the information technology industry, storage drives, backup and recovery data management, are also going through…
Read More » -
Why Smart Cities Must Be Cyber-Smart Cities
You’ve probably heard the term “smart cities” – that is, the idea that extensive use of Information and Communications Technology…
Read More » -
Configuration Mistakes That Provide Field Days for Hackers
Sometimes it’s the little things. In hindsight, more often than not, getting hacked can stem from a minor misstep or…
Read More » -
The Path to an AI Solution
When it comes to artificial intelligence, most people are well aware of the tropes from popular entertainment: the malevolent computer,…
Read More » -
Building Resilience to Cyber Weakness During Digital Transformation
For regional businesses, it appears their exposure to risk is continuously moving upwards. In the past, risks were limited to…
Read More » -
ESET Research Shows How Amazon Echo and Kindle Got KRACKed
ESET Smart Home Research Team recently discovered that the popular Amazon Echo – the original hardware of Amazon Alexa –…
Read More » -
How Concerned Are You About Your IoT Privacy Challenges?
[responsivevoice_button voice=”US English Female” buttontext=”Listen to the Story”] The alarm is ringing. Half asleep, you scramble for your smartphone on…
Read More » -
Seven Ways to Create a Green Office
Through Vision 2021, the UAE supports the proliferation of clean energy and “green” growth plans. The UAE was ranked seventh…
Read More » -
Here’s How to Stay Ahead of Emerging Cyber Threats
As the attack methods and strategies of our cyber adversaries continue to expand, organizations must stay ahead of those threats…
Read More » -
Beginning DevOps: How to Bring Your Company Along on the Journey
The concept of DevOps in IT has been around for over 10 years and represents a change of focus in…
Read More »