
SAMA Cybersecurity Framework Compliance: Benefits and Requirements
Understanding SAMA’s Cyber Security Framework Due to the increasing ubiquity of cyber-attacks, the financial sector [...]
A Complete Guide to the Digital Operational Resilience Act (DORA)
Trying to understand DORA? Think of it like this: The Digital Operational Resilience Act (DORA) [...]
AI Governance – Secure the Future by Embracing Responsible AI Practices
AI in Simple Terms At its core, AI is simply software that can ‘think’, ‘learn’, [...]
Cracking the Code: Understanding the European Cyber Resilience Act and its Impact
EU Cyber Resilience Act The Cyber Resilience Act (CRA) exists to bolster cyber security for [...]
Four ISO 27001 Compliance Key Areas You Should Know
Many things that are important in getting ISO 27001 compliant but in this blog post, [...]
APACHE STRUTS 2 Critical Vulnerability – CVE: 2023-50164
Risk Rating: CRITICAL CVSS Score: 9.8 Vulnerability Type: Remote Code Execution (RCE) CVE Identifier: CVE-2023-50164 Exploitation [...]
How to Establish a Clear Desk & Clear Screen Policy for Your Organisation
You know that feeling when you walk into an office, and it looks like a [...]
What is Open-Source Intelligence and How to Get Started
Imagine a world intricately woven with connections, where information flows like a meandering river of [...]
NIS2 Directive Timeline & Requirements to Minimise Risks
NIS 2 is Changing It’s getting Risky out there… The protection of our networks and [...]