Unknown

Centrify expert: There are no longer any security parameters

An expert from Centrify believes a change in security parameters has led to an avalanche of cyber breaches. Dr. Kamel Heus, Security and Identity Specialist for Centrify, says despite the huge amount of money spent on...

Remotely protect and control your data with Seclore 3.0

Seclore is one of the pioneers in the EDRM (Enterprise Digital Rights Management) space. The company has recently launched their new product version, Seclore 3.0. Intelligent CIO caught up with Rohit Oberoi, Director...

SecureWorks talks ransomware, cyber fraud and social engineering

Intelligent CIO caught up with Gopan Sivasankaran, SecureWorks’ Security Architect at this year’s GITEX Technology Week to discuss the evolving cyberthreats targeting organisations, and individuals, today....

Pay-per-use cybersecurity offers flexibility to grow

Sebastien Pavie, Regional Director, META Enterprise and Cybersecurity at Gemalto, discusses the impact of biometrics and the cloud on cybersecurity. Q: How is the Middle East’s rapid adoption of the cloud changing the I...

Automation is now mandatory for cybersecurity

Technology has finally evolved to a place where you can trust a lot of what it can do, explains Jason Mical, VP of Endpoint Products, Fidelis Cybersecurity. Q: What is Fidelis focusing on at GITEX this year? A: We are...

A10 Networks: DDoS attacks in the Middle East are scaling dramatically

Intelligent CIO caught up with A10 Networks’ EMEA Partner Director, Chris Gale, at GITEX 2017 to discuss the company’s plans for the event and to gain insight into the DDoS landscape in the Middle East. Q:...