Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Ministry of Foreign Affairs and Strategic Trade Partnerships

In today's interconnected world, trade is no longer just about goods crossing borders; it's about building relationships, fostering trust, and creating long-term partnerships that benefit entire economies. For the UAE, these relationships are nurtured and strengthened in collaboration with the Ministry of Foreign Affairs and other entities that play a pivotal role in shaping the country's global trade landscape.
Featured Post

The Global Regulatory Convergence: A Catalyst for Smarter Compliance

As digital technologies and threats transcend borders, the global convergence of regulatory frameworks is no coincidence. Governments and regulators are recognising the need for consistency as cyberattacks, data breaches, algorithmic bias, and systemic failures in digital infrastructure are no longer local concerns but are global risks that require harmonised solutions.

EP 14 - Beyond secrets: Securing the future of machine identity

In this episode of Security Matters, host David Puner sits down with Matt Barker, CyberArk’s VP and Global Head of Workload Identity Architecture, for a deep dive into the exploding world of machine identities and the urgent need to rethink how to secure them. From his journey co-founding Jetstack and creating Cert Manager to leading CyberArk’s efforts in workload identity, Matt shares insights on why secrets-based security is no longer sustainable—and how open standards like SPIFFE are reshaping the future of cloud-native and AI-driven environments.

Controlling non-human identities in your enterprise with One Identity

With every organization vying to automate away their cybersecurity problems, it’s easy to allow the machine identities taking on formerly manual tasks to become entryways for threat actors. Learn the must-haves for securing the non-human identities streamlining your organization with One Identity sales engineer Rob Kraczek.

The API Security Reality Check: Key Takeaways from Q2 2025 API ThreatStats Report

API security has never been more crucial. Vulnerabilities are growing in volume and severity. AI integrations are a burgeoning attack vector. Increasing GraphQL adoption presents hidden dangers. To protect your organization, you must secure your APIs. Keep reading for our key takeaways from the Wallarm Q2 2025 API ThreatStats report – and find out what you need to do to protect yourself.

Why Smart Companies Are Moving to Context-Based AI Security

AI consumes massive volumes of unstructured data — emails, documents, reports, and prompts. Hidden within them are sensitive details: customer PII, salary data, intellectual property, and confidential financial information. Without the right safeguards, one innocent prompt can lead to costly data leaks, compliance violations, and privacy risks. Traditional security tools like RBAC, DLPs, and prompt filters weren’t designed for AI. They fail because AI doesn’t see folders — it consumes raw context. That’s where Protecto’s Context-Based Access Control (CBAC) comes in.

CVE-2025-7775: Memory Overflow Vulnerability in Citrix NetScaler ADC and Gateway

On August 26th, 2025, Citrix patched CVE‑2025‑7775, a memory overflow vulnerability in NetScaler ADC and Gateway appliances that allows unauthenticated remote code execution (RCE) and/or denial-of-service. This threat is confirmed to be actively exploited in the wild. Citrix strongly emphasized that no mitigations exist aside from applying the patch immediately.