
Blog
Home / Blog
Blog
Latest Articles & Stories
How SAMA-Regulated Entities Can Create a Modern Vulnerability Management Program Incorporating Risk-Based Principles
The Kingdom of Saudi Arabia has positioned itself as a significant force in the realms of financial technology, banking, and innovation in financial services. As this sector experiences remarkable expansion, the importance of regulatory clarity and governance in cybersecurity becomes increasingly crucial. The Saudi
CTEM on the Brink: How a CVE Shutdown Nearly Crippled Cyber Exposure Management
CTEM’s Invisible Backbone: The Role of CVEs Deep in the depths of CTEM, VAPT, red teaming and threat intelligence—where I worked intimately with enterprise customer, I saw firsthand the vulnerability of our digital landscape. But nothing made this truth more crystal clear than the April
Why Breach and Attack Simulation Can’t Replace Red Teaming
I’m not against Breach and Attack Simulation (BAS). In fact, I think it has its place. But the way it’s being pitched, oversold, and misunderstood
Unverified Leaks, Dramatic Fonts: The CTI Starter Pack
Let me get this off my chest. Every time I open LinkedIn, it feels like a never-ending parade of CTI vendors screaming about some ‘dark
How to Evaluate a Penetration Testing and Red Teaming Partner for Your Next Offensive Security Engagement
The State of Penetration Testing Today Penetration testing has become a checkbox service in cybersecurity. Nearly every cybersecurity solutions and services company today claims to