Feature The Cyber Era of American Military Affairs Digital transformations are transforming all aspects of human existence, even one as old as humanity…kudsiaFebruary 11, 2019
Feature DevSecOps: Introducing The New Kid On The Block. DevSecOps occupies the buzzword throne in the world of cybersecurity and promises to stay there…kudsiaJanuary 21, 2019
Feature DATA: To Be Protected, Controlled, Or Commercialised? 3 major economies are steering the world in 3 opposing directions. Governments in the US,…kudsiaJanuary 14, 2019
Feature 5 Resolutions for 2019 – & How to Actually Keep Them So You Don’t Get Phished Easy tips to share with the office for a safer year. 2019 is here and…kudsiaJanuary 3, 2019
Feature Anatomy of a Cyber-Attack 7 Phases of a Cyber Criminal’s Methodology. Hacks are ever-evolving and come in all shapes…kudsiaDecember 13, 2018
Feature 3 Cyber Threats to the Oil & Gas Industry Accounting for ~ 50% of the world’s energy consumption, there is a lot that distinguishes…kudsiaDecember 12, 2018
FeatureOpinion 4 Ingredients That Make Israel a Cybersecurity Powerhouse With more start-ups and tech professionals per capita than any other country, it is no…kudsiaNovember 26, 2018
FeaturePress Release MENA’s 5 Digital Villains MENA’s governments and organisations have fallen victim to some of the most infamous cyber-attacks in…kudsiaNovember 5, 2018
FeatureInterviewOpinion Is IT-OT Convergence the Achilles’ Heel of Industrial Cyber Security? Operational technology (OT) is the beating heart of the critical infrastructures supporting our life standards.…kudsiaSeptember 11, 2018