If you are a cyber security professional or interested in joining the field, one of the best ways to learn about the latest developments and trends is by reading relevant blogs.
However, with thousands of blog posts and news items published every day, it’s hard to keep up to date. That’s where the IT Governance Gulf blog comes in.
Our blog has grown rapidly over the past year, covering a wide range of topics in the GCC (Gulf Cooperation Council) region, including data protection, information security, the PCI DSS (Payment Card Industry Data Security Standard), business continuity, service management and more.
We’re now opening our blogs to guest writers, offering them a platform for sharing their cyber security knowledge and expertise. For your article to be considered, it should be relevant, well-written, informative and original. For more information, please click here.
Here are our 10 most popular cyber security blog posts on IT Governance Gulf blog during July 2018:
Creating a privacy notice is an important part of your EU GDPR (General Data Protection Regulation) compliance project, but knowing what it should say or where to start can be difficult. Read more
The GCC spent US$7.2 billion (about 27 billion SAR) on cyber security in 2016, and spending is expected to reach $11.4 billion (34 billion SAR) by 2024. Read more
Phishing scams are rife in the GCC region. Cyber criminals are getting smarter and their attacks more sophisticated, so businesses need to work harder to protect their information security and assets. Read more
Many small businesses in the GCC region mistakenly believe the GDPR doesn’t affect them because they are not based in Europe and have fewer than 250 employees. Our GCC small business guide to the GDPR should help clarify things. Read more
In April, Careem reported that the names, email addresses, phone numbers and trip data of 14 million customers had been stolen. Read more
Data protection compliance in the Gulf states is a complicated business, with many different laws and requirements. Read more
We often talk about the benefits of obtaining ISO 27001 certification, but there are many more immediate benefits associated with implementing an ISMS (information security management system). Read more
There are no federal data protection laws in the UAE, nor is there any national data protection regulator. However, there are a number of national and sectoral laws that relate to data protection and privacy in some capacity. Read more
An information security policy is one of the required documents outlined in Clause 5.2 of ISO 27001. There is sometimes confusion among our clients about what should be included in the policy, so to help you get started we have outlined four key elements that will help shape this important piece of documentation. Read more
Mobile applications, web applications, Bluetooth and Wi-Fi are all vulnerable, and attacks are more likely when using open, unsecured networks. Cities promoting increased connectivity need to make sure they warn of the dangers that come with this convenience. Read more
IT Governance newsletter
Want to stay up to date with developments and resources in the IT GRC market? Subscribe to our newsletter!