Contingency plans will minimise the business impact of canceled or postponed events and enable organisations to overcome associated disruptions due to coronavirus, according to Gartner. Respondents to the 2019 ...
GEMS Education schools in the UAE have rolled out exceptional remote learning plans for students and parents since the mandated closure of schools and the move to E-learning last month. In excess of 4.3 million...
SANS Institute, the global leader in cyber security training and certifications, has identified a 30% increase in attacker interest in Remote Desktop Protocol, RDP, servers during the month of March 2020. This ...
Scientists from the Slovak companies MultiplexDX, Lambda Life and ProScience Tech have joined forces with virologists from the Biomedical Centre of the Slovak Academy of Sciences, BMC SAV, to develop a reagent ...
“As I said on 8 April, the COVID-19 pandemic is one of the most dangerous challenges this world has faced in our lifetime. It is above all a human crisis with severe health and socio-economic consequences”, he ...
Gita Gopinath, Economic Counsellor and Director of the IMF’s Research Department, said in a blog post that following the global lockdown in response to the coronavirus, “the magnitude and speed of collapse in a...
As the global epidemic of the COVID -19 plagues the world, we are in danger of not learning from many of our past disasters and to really utilise and re-emphasize the many fields where artificial intelligence a...
As the COVID-19 pandemic spreads across countries and with the government’s mandate to practice social distancing, retailers have witnessed a rapid surge in e-grocery sales, a development which could cause a se...
Organisations around the world find themselves in different phases of managing the impact of the COVID-19 pandemic. While the challenges vary by location, industry and business maturity, identifying and impleme...
Prominent limitations of cybersecurity solutions include the lack of large-scale threat analytics that leverage ML for both structured and unstructured data, the inability to empower end-user devices to detect ...