RACE Model: Building Cyber Resiliency and Mitigating Network Risks by Going Back to Basics
Resilience is key to surviving in today’s world full of emerging technologies and hot-button buzzwords.
Resilience is key to surviving in today’s world full of emerging technologies and hot-button buzzwords.
CNG continue their ongoing journey across the UAE with another hugely impressive event in Abu Dhabi, CIS CyberForge.
CIS CyberForge Abu Dhabi Recap Read More »
The McPartland Review of Cyber Security and Economic Growth: Final report and recommendations – The Rt Hon Stephen McPartland
The McPartland Review of Cyber Security and Economic Growth Read More »
2024 marks the year supply chain cyber attacks became a mainstream concern, disrupting industries worldwide. How can you understand and reduce the supply chain risks?
Supply Chain Security: Understanding and Reducing Risks Read More »
From Fraud Victim to anti-Fraud Champion, “Catfished” Tinder Swindler Victim Ayleen Charlotte shares her story.
“Catfished” Tinder Swindler Victim Ayleen Charlotte shares her story. Read More »
Matt O’Neill and Hieu Minh Ngo share their unique story of redemption, as the pair seek to transform global understanding of evolving cybersecurity threats
Newly released report ahead of GISEC Global 2024 offers deep dive into current conditions of the region’s cybersecurity industry
Regulation remains the strongest multiplier to cybersecurity growth Read More »
The year of 2022 was remarkable in terms of significant rise in the number of Distributed Denial of Service (DDoS) attacks and their intensity worldwide.
The Total Number of DDoS Attacks in 2022 Increased by 73% Worldwide Read More »
The supply chain challenges that we are facing in the digital age are often relegated as low priority both by cyber professionals and by businesspeople.
The Battle for The Digital Supply Chain Read More »
At the end of every year, leading cybersecurity companies place their bets on what the biggest threats will be the following year.
Understanding The Growth And Risks Of Low-Code/No-Code Solutions Read More »