Blogs

Fresh thinking, practical ideas, and perspectives that matter.

Past

Upcoming

Security Performance Measurement: From compliance to confidence – Part 2

Past

Upcoming

Security Performance Measurement: From compliance to confidence – Part 1

Past

Upcoming

Bridging the gap: Integrating secure code review into the DevSecOps

Past

Upcoming

Cyber in hybrid conflict: The new invisible frontline

Past

Upcoming

How to write threat models that engineers actually use for stronger cybersecurity

Past

Upcoming

Cybersecurity Documentation: Best practices for SOC, IR and security teams

Past

Upcoming

The Big Shift: Making cyber agentic AI (CA2) safer – Governance, guardrails, and assurance

Past

Upcoming

Cyber resilience in an era of conflict: Why GCC organizations must rethink cloud assumptions

Past

Upcoming

Crisis-driven Cyber Resilience: Why SOC and Threat Hunting are Mission-Critical in the GCC

Past

Upcoming

vCISO vs. Advisory CISO: How to choose the right Trusted Cybersecurity Advisor