Building on the proven promise of innovation to contribute to a strong economy through job creation, income generation, and long-term socio-economic growth, the Middle East innovation landscape continues to evolve. In a ...
After captivating audiences in Qatar, the World CIO 200 Roadshow 2020 moved over to Saudi Arabia. On November 24, the Saudi edition of the roadshow unfolded, virtually, in front of a packed audience made of digital leade...
It is delighted to announce that Geo News has allied with Loco Services as Exclusive Media Partner for “The World CIO200 Summit (Pakistan Edition)”. Loco Services is an event management company, specialized in the filed ...
The GCC e-commerce sector is forecasted to reach a value of $50 billion by 2025, according to a new report by Kearney Middle East. The report titled GCC e-commerce unleashed: a path to retail revival or a fleeting mirage...
Bahrain has an ambition to become the centre for artificial intelligence research, attracting multi-national technology companies to set up base here. The fast advances of artificial intelligence, robotics, and other tec...
Telecommunication companies have reached a pivotal moment. The industry is evolving at an unprecedented pace, accelerated by the arrival of 5G networks. For telcos to remain competitive in this changing marketplace, they...
Organisations around the world are at a greater risk of insider threats than ever before, with reported incidents up 47% year on year. And they are as damaging as they are prevalent. In the UAE, Proofpoint’s recent resea...
Enterprise data centres need to prepare for the next technology evolution to accommodate the incessant increase of data generation. 100G is set to become the next speed for the core or spine network. Different variants o...
The financial services industry is an appealing target for cyber criminals today. Arguably, consumers financial, banking, trading and superannuation information is some of the most important data held by organisations to...
Threats to endpoints can come in the form of external attacks as well as insider threats, which may be either malicious or unintentional in nature. A compromised endpoint can give an attacker a foothold within an environ...