by Shlom | Jun 12, 2017 | Uncategorized
Increasingly, the Middle East is adopting cloud computing and this is creating new challenges in security. Security needs are being handled with new and innovative risk management protocols. In the aviation industry in particular, there has been a key challenge in...
by Shlom | Jun 12, 2017 | Uncategorized
Social media in the 21st century is ubiquitous. However, its soaring and expanding use is causing a headache for IT security professionals who have to contend with a whole new range of problems caused by people’s use of social media sites. Greg Masters writes in...
by Shlom | Jun 12, 2017 | Uncategorized
With every other aspect of the online world moving increasingly onto mobile devices, it is time for the world of business intelligence and analytics to catch up. Mobile BI – with good management, and the right infrastructure – can be a powerful extension for the...
by Shlom | Jun 12, 2017 | Uncategorized
The world of IT is driving automation and improving service delivery all the time. This is having a direct and positive effect on company revenues as well. It is entirely unfortunate that some of this has being eaten up by the ever more complex ways that criminals and...
by Shlom | Jun 12, 2017 | Uncategorized
The internet is now a hostile place – that is the finding of recent research into a cyber-attack on Github. Specifically, the researchers said the entire Chinese internet is now hostile. They say this because they have discovered a tool they have dubbed the...
by Shlom | Jun 12, 2017 | Uncategorized
Social media, and its ever-increasing use, seems to be fuelling a growing wave of cyber-crime that’s linked to its easily exploitable attack surface. Steve Ragan, writing for CSO Online, talks about one very interesting attack surface that criminals have been...