By

Data Consult

Data Consult Transforms Service Delivery and Customer Experience with Oracle

Data Consult Automates Incident Detection and Management by integrating Oracle Service Cloud Data Consult is a technology services company, headquartered in Beirut, with presence in the Levant and Saudi Arabia. The company provides managed services in different technologies. Its customers span most industry verticals and require specialized solutions for service provider networks, contact centers and...
Read More

Data Consult awarded “Collaboration Partner of the Year” & “Transformational Partner of the Year”

Once again, Data Consult is making headlines! The “Cisco ME West Partner Summit – 2018” has granted Data Consult the “Collaboration Partner of the Year”, and the “Transformational Partner of the Year” awards! We’re proud to be honoring our CISCO Gold Certified Partnership for the 14th consecutive year, and sustaining our journey to provide tailor-made digital solutions across the whole MENA region.
Read More

A smart urbanization in Lebanon that focuses on ensuring air quality

BeitMisk is a private community located twenty minutes from Beirut (Lebanon) thought to be self-sufficient and ecological, and pays special attention to the quality of the air breathed by its inhabitants and is controlled in real time through a system of sensors that send the information to a digital platform to whose information both the...
Read More

Cisco Backdoor Account & Other Critical Vulnerabilities

Hello, Very recently Cisco announced 3 “critical risk” and numerous other “high risk” vulnerabilities. One of those vulnerabilities affect IOS XE devices which come with a default pre-configured privileged account which if known could grant easy access to the device by an attacker. Some sources say that this made its way by mistake from testing...
Read More

American University of Beirut: Digital transformation with the student at heart

By DALE BENTON Through a five-year digital transformation plan, the American University of Beirut is redefining its entire IT infrastructure with the ultimate goal of enriching the lives of its students The role of the CIO is evolving. IT has traditionally been viewed as operating almost as a separate entity when placed within the wider context...
Read More

Security Alert: Processors Meltdown!

Hello, Recently multiple disclosed security vulnerabilities took the Internet by storm. Dubbed “Meldown” and “Spectre”, those vulnerabilities seem to affect numerous systems and processors including Intel, AMD, ARM; thus it has the potential to affect PCs, servers, networking equipment, mobile devices and even cloud. An attacker can exploit those vulnerabilities by running a special code...
Read More

Wifi is no Longer Secure – WPA2 got KRACKed !

On October 16, 2017, Mathy Vanhoef and Frank Piessens of imec-DistriNet published a paper detailing their discovery of security weaknesses in WPA2. WPA2 (Wi-Fi Protected Access II) is a widely used security protocol developed by the Wi-Fi Alliance for the purpose of  encrypting and securing the traffic on Wi-fi connections between the Wi-fi router and endpoints. WPA2...
Read More

Lebanon Smart City Experience

On Saturday 16th of September, 2017, Ogero in collaboration with Data Consult  launched the first smart city in Lebanon at BeitMisk. This project has been initiated by Ogero a few months ago, as part of its nationwide digital strategy. One of the objectives Ogero is aspiring to achieve, is to build a nationwide Internet of...
Read More

SNMP Remote Code Execution Vulnerabilities in Cisco IOS and IOS XE

Summary: The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected...
Read More

WannaCry: A Massive Ransomware Outbreak

WannaCry: What do you need to know?   Following the release of NSA hacking dumps by Shadow Brokers, blackhat hacker groups used 2017’s most famous Microsoft Windows exploit created by NSA’s “ETERNALBLUE” which takes advantage of a vulnerability in Windows SMB protocol. The hacker group behind WannaCry ransomware launched the largest cyber attack in years...
Read More
1 2 3 4