Press Center

DIFC Data Protection Law
Cyber Threat Intelligence and OSINT
Threat Model and Security Considerations for Remote Workers
DLP - Defacto Security
Secure SD-WAN
Office 365 Security
Email Security
ICS MITRE ATTACK Techniques
Cyber Threat Management - Part 1
How to Secure Home Network for Remote Working
Automated Threat Response with SOAR
OT Vs. IT Security
COVID-19 Implications
ADNOC HQ
Shah Sheikh Awarded Emerging Technocrat by Amity University
Shah Sheikh Interview on the Business Breakfast Show
Demystifying Osquery for fun and profit
Qubit Cyber Security Conference