Blogs

Fresh thinking, practical ideas, and perspectives that matter.

Past

Upcoming

Unmasking a Modern Cyber Assault: Lessons from the Anthropic attack

Past

Upcoming

Compliance isn’t security: The hidden risks of a checkbox approach

Past

Upcoming

GraphQL Abuse: The silent killer in API security

Past

Upcoming

Securing DevOps: A GRC perspective on agility, assurance and security integration

Past

Upcoming

How SOCaaS can power transformation and foster innovation in GCC

Past

Upcoming

Filtering the noise: A smarter approach to SCADA security

Past

Upcoming

Why is red teaming a must for OT systems

Past

Upcoming

UAE cybercrime statistics 2025: Key data and trends

Past

Upcoming

Cyber Risk Management: Qualitative vs. Quantitative Approaches

Past

Upcoming

Why AI-powered SOCs are the future of cyber defense