Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Get a unified approach towards Compliance with NIS2 and DORA

In the cyber security domain, the increase of cyber-attacks alongside the acceleration of businesses’ digital transformation, drive states to deploy a more ringent regulatory framework to protect data and establish a code of conduct for businesses. In this perspective, it is essential to view compliance as an integral component of the wider governance framework, which is grounded in international standards of an interconnected world that makes best use of already tested best practices.

Understanding Polymorphic Viruses and Polymorphic Malware

Polymorphic viruses and polymorphic malware represent some of the most sophisticated challenges in modern business. These types of malware are designed to evade traditional cyber security measures by constantly changing their appearance making them particularly difficult to detect and eliminate.

The Middle East's Rise in Economic Growth: A Prime Target for Cybersecurity Threats

Obrela’s Nick Loumakis, Regional Managing Director MENA, describes the complex cyber attack landscape across the Middle East As the Middle East undergoes rapid economic growth and digital transformation across key sectors like finance, energy, and government, the region faces a surge in cybersecurity threats. The integration of cloud services, IoT devices, and digital financial systems has increased vulnerabilities, making it a focal point for sophisticated cyberattacks.

What is GRC in Cyber Security? Why is it Important?

Governance, Risk Management, and Compliance (GRC) in cybersecurity is a framework that is designed to help organizations align their security efforts with business objectives while also managing risks and adhering to legal and regulatory requirements. To implement GRC in Cyber security effectively, it is important to understand the purpose of each element and the part each has to play in improving an organization’s security posture.

What is a social engineering attack? Types of social engineering attacks

A social engineering attack is a form of cybersecurity attack where attackers approach individuals and psychologically manipulate them into divulging sensitive information or performing actions that compromise security. Unlike traditional hacking methods that exploit system vulnerabilities, social engineering preys on human psychology, using the likes of deceit, urgency or trust to bypass defenses.

Why you need risk-aligned cyber security to build resilience

Despite significant investments in cybersecurity technologies and services, many organizations remain vulnerable. One of the myriad reasons is the lack of alignment between cybersecurity strategies and specific risks each organization faces. This is where risk-aligned cybersecurity comes into play, ensuring that defenses are tailored to the unique challenges and threats an organization faces, ultimately building greater resilience.

What is Cloud Security? Best Practices, Challenges

Cloud security refers to the comprehensive set of measures and technologies designed to protect data, applications, and infrastructure within cloud environments. As more businesses migrate to cloud platforms, safeguarding these environments becomes critical. The shift to cloud brings efficiency, scalability, and cost-effectiveness, but given the rising trends of cyber-attacks, it also introduces new security challenges that must be addressed to ensure sensitive data remains protected.

Vulnerability Assessment VS Penetration Testing: What's the difference?

In cybersecurity, vulnerability assessment and penetration testing are often discussed together, but they serve distinct purposes in securing a network. Organizations looking to strengthen their cybersecurity defenses must understand the differences between the two, as well as when and how to use each. This blog explores the difference between vulnerability assessment and penetration testing, and why a combined approach can be essential in achieving the most robust security strategy.

MDR vs MSSP: What is the difference?

At Obrela , our mission is to keep your business in business. And we achieve it by protecting and preventing malicious attacks from cybercriminals. When we onboard new clients, we are often asked to explain the difference between MDR and MSSP. Both options offer managed cybersecurity processes. However, there are some key differences between MDR and MSSP.