Blog
Guide to CTI: Roles, Evolution, and the Lifecycle
In the realm of cybersecurity, establishing a Cyber Threat Intelligence (CTI) function is not just a one-time task but a structured process. The initial step in this process involves setting the overarching objectives of the CTI function, defining the CTI roles, and determining the advantages it will bring to the organisation. Typically, these objectives encompass…
November 3, 2023
Guide to SAMA approach to CTI with RST Cloud
The Saudi Central Bank (Saudi Arabian Monetary Authority – SAMA) recognises the role that CTI plays in enhancing cybersecurity. See how to meet the requirements
October 20, 2023
Ahmad Almorabea: In the modern digital world, access to reliable threat intelligence is essential
A review of RST Cloud services was conducted by industry expert from Saudi Arabia Ahmad Almorabea. We’re excited to showcase his experiences and findings
October 17, 2023