INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Multiple sectors CRITICAL 33m Global vulnerability Information Technology / Software Infrastructure CRITICAL 35m Global data_breach Healthcare CRITICAL 50m Global data_breach Mobile Technology / Consumer Electronics HIGH 1h Global ransomware Cybersecurity Services / Multiple Sectors CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 1h Global malware Financial Services, Mobile Payments HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 5h Global apt Cryptocurrency and Blockchain CRITICAL 13h Global malware Financial Services / Cryptocurrency CRITICAL 14h Global vulnerability Multiple sectors CRITICAL 33m Global vulnerability Information Technology / Software Infrastructure CRITICAL 35m Global data_breach Healthcare CRITICAL 50m Global data_breach Mobile Technology / Consumer Electronics HIGH 1h Global ransomware Cybersecurity Services / Multiple Sectors CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 1h Global malware Financial Services, Mobile Payments HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 5h Global apt Cryptocurrency and Blockchain CRITICAL 13h Global malware Financial Services / Cryptocurrency CRITICAL 14h Global vulnerability Multiple sectors CRITICAL 33m Global vulnerability Information Technology / Software Infrastructure CRITICAL 35m Global data_breach Healthcare CRITICAL 50m Global data_breach Mobile Technology / Consumer Electronics HIGH 1h Global ransomware Cybersecurity Services / Multiple Sectors CRITICAL 1h Global apt Cryptocurrency and Blockchain CRITICAL 1h Global malware Financial Services, Mobile Payments HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 5h Global apt Cryptocurrency and Blockchain CRITICAL 13h Global malware Financial Services / Cryptocurrency CRITICAL 14h

🔐 Cybersecurity Glossary

Over 265 professional cybersecurity terms in English & Arabic — your comprehensive reference for the cybersecurity world

265 terms 16 categories 47 frameworks
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
9 terms
🏛 SAMA Cybersecurity Framework SAMA CSF
إطار الأمن السيبراني لساما
Mandatory cybersecurity framework issued by the Saudi Arabian Monetary Authority for all regulated financial institutions. Version 2.0 contains 251 sub-controls across 12 domains covering governance, risk, IAM, operations, and business continuity.
🏛 Security Architecture
البنية الأمنية
A unified security design that addresses the necessities and potential risks involved in a certain scenario and specifies when and where to apply security controls.
🏛 Security Baseline
خط الأساس الأمني
A minimum set of security controls required for a system or organization to operate safely.
🏛 Security Governance
حوكمة الأمن
The set of responsibilities exercised by the board and executive management to provide strategic direction and oversight of cybersecurity.
🏛 Security Governance Framework SGF
إطار حوكمة الأمن السيبراني
A comprehensive structure of policies, procedures, and controls that establishes accountability and oversight for cybersecurity activities across an organization. It defines roles, responsibilities, and decision-making processes to ensure security objectives align with business goals and regulatory requirements.
🏛 Security Metrics KPI
مقاييس الأمن
Quantifiable measurements used to track and evaluate the effectiveness of an organization's security program.
🏛 Security Policy
السياسة الأمنية
A formal document that defines the rules, guidelines, and practices for managing and protecting an organization's information assets.
🏛 Security Steering Committee
لجنة توجيه الأمن
A cross-functional leadership body responsible for providing strategic direction and oversight of the cybersecurity program.
🏛 Sender Policy Framework SPF
إطار سياسة المرسل
An email authentication protocol that allows domain owners to specify which mail servers are authorized to send emails on behalf of their domain. SPF helps prevent email spoofing by enabling receiving servers to verify that incoming mail from a domain comes from an authorized IP address.
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.