It’s a tale as old as time: the CISO, the eternal pessimist, the blocker of all things fun and innovative. But times are a-changin’. Thanks to...
Marriott, the hotel giant that promised luxury and comfort, has instead delivered a nightmare of data breaches. Over the years, Marriott and its subsidiary, Starwood Hotels,...
Don't be fooled by the name. We're not talking about the sleek, black snake that can strike faster than the blink of an eye. No, we're...
The 2024 State of SaaS Security Report highlights the dual nature of SaaS: revolutionizing work while introducing security vulnerabilities. Key issues include decentralized control, lack of...
Cybercriminals and hacktivists are increasingly targeting the United Arab Emirates, Saudi Arabia, and other nations in the Gulf Cooperative Council (GCC) region. This surge in attacks...
Another Day, Another Scam It’s a sad reality that the world of online finance is rife with fraudsters looking to exploit unsuspecting victims. The latest scam...
Saudi Arabia is advancing women's participation in cybersecurity, aligning with Vision 2030 goals. This initiative enhances digital security and promotes gender equality and economic empowerment. Mentorship...
Been in cybersecurity for decades. Seen it all. Financial sector is a prime target. Need threat intelligence, collaboration, and investment in new tech. Stakes are too...
New SEC Cybersecurity Regulations: A Must-Read for Public Companies The SEC has introduced stricter cybersecurity disclosure requirements for public companies. This article breaks down the key...
First off lets define what technical debt is, specifically when looking at it through the lens of a CISO. Technical debt, in with this context, refers...
Recent Comments