Quantcast
Channel: Blog – SSN-Gulf
Browsing all 45 articles
Browse latest View live

Guest blog: Just how safe is a smart home?

US – From smart locks to lighting systems, smart home technology features are advancing at an accelerated rate. According to a survey conducted by Coldwell Banker in the US last month, nearly 60 per...

View Article



Guest blog: Integrators on how to adapt and thrive

BLOG FROM THE US: The subtitle for this year’s “State of the Integrator” panel discussion at PSA-TEC was “Adapt or Die.” Despite the foreboding subtitle, the panelists’ outlook was decidedly optimistic...

View Article

Hot on the web: Why Apple loves this new home security cam and its 1TB of...

SSN Gulf checked out this very interesting post from respected Apple-themed blog Cult of Mac… HOME SECURITY system manufacturer Uniden just released a swanky new system that can store 120 days’ worth...

View Article

Guest blog: Combating security issues faced by ME Telco operators deploying...

Yarob Sakhnini, regional director, MEMA at Brocade, (pictured) talks about safeguarding customer data and applications with the Advent of Cloud ONE OF the major advantages of deploying SDN is that the...

View Article

Guest blog: Dubai’s Red Solutions explains its SMART approach

Geoff Moore, CTO of Red Solutions, urges solutions designers to get to grips with mobile threats. WITH THE ever expanding role of mobile devices in our modern lives, the information they carry and the...

View Article


Guest opinion: Can new network environments actually be trusted? Trevor...

With ever more high tech, penetration in the telecom industry and mobility, Trevor Dearing, EMEA marketing director at Gigamon, asks – can new network environments really be trusted? THE TELECOMS...

View Article

Guest blog: Zombies, ghosts, goblins and DDI, oh my! The 3 kinds of servers...

Dave Signori, Senior Director of Product Management at Infoblox – which delivers critical network services that protect Domain Name System (DNS) infrastructure – shines an eery light on the servers...

View Article

Guest blog: Seagate’s Christian Assaf talks about the evolution of...

By Christian Assaf, Senior Sales Manager META, Seagate (pictured) VIDEO SURVEILLANCE HAS been around since the 1940s, but it was quite a bit harder to manage back then. Most of the earliest systems had...

View Article


Guest blog: The potential of passive DNS in protecting network infrastructure

Cricket Liu, Chief DNS Architect, at Infoblox looks as new mechanisms being developed to tackle DNS cyber attacks THE NUMBER of attacks against Domain Name System (DNS) infrastructure has grown...

View Article


Renting a vacation property? How to find those hidden cameras…

US – In a recent post on popular tech website Kim Komando – aka ‘America’s Digital Goddess – a writer describes how during a recent vacation Komando rented a place through Airbnb. As she was looking...

View Article

Guest blog by A10 Networks: It’s a trap! Preparing for smokescreen DDoS attacks

Guest blog: Rene Paap (pictured), product marketing manager, A10 Networks assesses the threat from distributed denial of service (DDoS) attacks… THE THREAT landscape is more complex than ever, and...

View Article

The Top 10 values of video surveillance, according to the experts

UAE – Storage innovator and security tech firm Pivot 3 lists (in case you’ve forgotten) the top ten values offered by video surveillance systems… 1 INCIDENT DETERRENCE The presence of a camera or...

View Article

Guest blog: Adaptive trust – a new defence for secure enterprise mobility in...

Michael Netterberg, Solution Architect, Networking at Aruba Networks (a Hewlett Packard Enterprise company) looks at BYOD, cloud and the Internet of Things and how they are changing enterprise defence...

View Article


Guest blog: 5 tips for improving company network security

Cherif Sleiman (pictured), General Manager, MEA at US technology firm Infoblox identifies the top 5 ways regional enterprises can combat information leaks and network hacking… IN MAY this year, we...

View Article

Five essential tips for keeping your e-commerce business and clients safe...

IF YOU have an e-commerce business you may be concerned about security. Expert Dianna Labrien from Tech.co has published five essential tips for staying safe… Have a system in place for purging...

View Article


Guest Blog by GE Digital Wurldtech: Internet of Things – Securing gateways to...

Guest blog by Tom Le, Executive Director, Cyber, GE Digital Wurldtech – he looks at securing connected environments. The Internet of Things (IoT) and the Industrial Internet of Things (IIoT) have...

View Article

Opinion: Intel Security opinion piece. Why enterprises need a multi-layer...

Scott Montgomery is vice president and chief technology officer of public sector at Intel Security. He runs worldwide government certification efforts and works with industry and government thought...

View Article


Guest comment by Darkmatter: The hack of Yahoo accounts, and the 700 days it...

By Eric Eifert, Senior Vice President – Managed Security Services, DarkMatter On Thursday, 22 September 22, 2016, Yahoo confirmed that hackers stole the personal data associated with at least 500...

View Article

Guest blog: Best practices for remote and branch office (ROBOs) data protection

Gregg Petersen, Regional Director, Middle East and SAARC, Veeam Software explains why business and IT leaders need to get to grips with the unique needs of remote offices and branch offices....

View Article

9 simple steps to staying safe online during the festive season

UAE – Cybercrime is on the rise as more and more criminals are exploiting the speed, convenience and anonymity of the internet. And with the holidays nearing, cybercriminals usually target their...

View Article
Browsing all 45 articles
Browse latest View live




Latest Images