Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Essential Cybersecurity Controls (ECC-1:2018) - A Comprehensive Guide

Cybersecurity threats continue to evolve, posing very real risks to organizations, and nowhere is this risk more pronounced than in entities that handle a nation’s critical infrastructure, as these attacks put public health and safety at risk, harm the environment, or disrupt critical services. The Gulf Cooperation Council (GCC) region plays a vital role in the petroleum industry, with Saudi Arabia ranking among the world's top 10 oil producers by daily output.

Beyond the Red Flags: Responding to a Failed Vendor Audit

Picture this: your vendor’s latest security audit just landed in your inbox, and you spot multiple failure points. What’s your immediate action plan? Failed vendor audits are an uncomfortable but increasingly common reality as reliance on third-party vendors grows, and handling them poorly can lead to data breaches, costly compliance violations, and serious operational disruptions. Knowing how to respond effectively isn't just good practice—it's essential risk management.

CVE-2025-2775: PoC Released for SysAid On-Premises Pre-Auth RCE Vulnerability

On May 7, 2025, watchTowr publicly disclosed technical details and a proof-of-concept (PoC) exploit for a pre-authenticated Remote Code Execution (RCE) chain affecting SysAid On-Premises, a self-hosted IT service management (ITSM) platform used by organizations to manage IT support tasks. Although the vulnerabilities were patched in March 2025, they had not been assigned Common Vulnerabilities and Exposures (CVE) identifiers and were disclosed for the first time with watchTowr’s publication.

Chasing passwordless? Omdia's new report recommends Extended Access Management

Omdia, a global analyst and advisory leader, recently released a report called “How Extended Access Management (XAM) closes the gaps in security.” The report outlines the challenges of managing access for the modern workforce and suggests strategies for addressing those challenges. Omdia defines the challenge areas of access management as: In 2024, 1Password launched Extended Access Management (XAM), a new security category designed to close the Access-Trust Gap.

Four new admin features to streamline rollouts, reduce friction, and boost adoption

We’re making it easier for IT and security admins to deploy 1Password Enterprise Password Manager at scale with three powerful new features that improve visibility, reduce onboarding confusion, and lay the groundwork for a more unified experience across our platform. Whether rolling out to your first 50 users or your next 5,000, these updates help you move faster, support your employees, and strengthen access security across your organization.

What to Do if You Are Affected by a Retailer Cyberattack

In April and May 2025, several prominent UK retailers including Marks & Spencer (M&S), Co-op, and Harrods experienced significant cyberattacks. At the time of writing we have not had confirmation of these attacks but consider them to be a Ransomware attack. These incidents are disrupting services, compromising customer data, and highlight vulnerabilities in retail cybersecurity. This guide aims to help you as a consumer take the steps you can take to protect yourself.

From Reactive to Ready: Automated Detections and Defense with Devo + Detecteam

Security analysts know the feeling: The all-too-familiar dread creeps in as a new exploit hits the headlines. Cyber teams worldwide brace themselves, knowing that their weekends, vacations, and carefully laid plans are likely about to go up in smoke. The first question a CISO will always ask rings in their ears: “Are we protected against this?”

How Compliance Frameworks Strengthens Security and Trust

For modern digital businesses, compliance isn’t just a legal requirement—it’s a trust-building and security-enabling mechanism. Compliance frameworks like PCI DSS 4, HIPAA, GDPR, and NIST establish the technical and procedural standards organizations must meet to protect sensitive data, avoid regulatory penalties, and qualify for cyber insurance.