
Top 10 Privacy Breach Penalties
Before we deep dive into the details of punitive actions that had been taken against

UAE’s Cyber Landscape
Why cybersecurity is an urgent necessity rather than a technical luxury? United Arab Emirates, is

Privacy By Design Principles
Privacy is the ability to control who can access the individuals’ personal information about their

Impact Of Pandemic on Information Security/ Cyber Security
In the wake of sudden health emergency of COVID-19 pandemic, the world came to a

Common Threats That Affect Organizations The Most
In this era where information forms the foundation of organizations and the only means to

Functions of OSI Layers
Open System Interconnection (OSI) Model developed by the International Standards Organization (ISO) which describe the

How To Conduct Information Security Risk Assessment in An Organization?
Information leakage, Failure of electricity, Damage to a network device, Bug in software, are various

A Critical Comparison
Over the years many standards and frameworks have been developed and adopted to address information

Difference Between IT and OT
Even with the same manufacturing organization Information Technology (IT) and Operation Technology (OT) can seem

How Does ISMS Protect OSI Model From The Cyber Threats?
Cyber threats can occur at any layer of the OSI Model, starting from the Physical

Top 10 Personal Data Breaches of 2020 – 2021
Data Breach is defined as a security violation, which involve Sensitive, Unauthorised and confidential Data

A critical comparison between ISO 27001 & NESA
What are the similarities between ISO 27001 & NESA? How are they different? What are the typical implementation pitfalls of these standards? Read on for an elaboration of many such topics.