Joushen
  • Home
  • Solutions
  • Services
    • Identity and access management
    • Offensive Security
    • Governance, Risk and Compliance
    • Virtual CISO
    • Awareness and Training Program
    • Cybersecurity Resilience Program
    • OT/ICS Operational Technology Cybersecurity
    • One-Stop-SMB’s
    • Blockchain Security Solutions
  • CyberCitadel
    • PTaaS
    • GRCaaS
  • About Us
  • Contact
  • Blog
  • Champions
  • Home
  • Solutions
  • Services
    • Identity and access management
    • Offensive Security
    • Governance, Risk and Compliance
    • Virtual CISO
    • Awareness and Training Program
    • Cybersecurity Resilience Program
    • OT/ICS Operational Technology Cybersecurity
    • One-Stop-SMB’s
    • Blockchain Security Solutions
  • CyberCitadel
    • PTaaS
    • GRCaaS
  • About Us
  • Contact
  • Blog
  • Champions
Free Consultation
  • العربية
Request A Quote
Joushen
  • العربيةالعربية
  • Home
  • Solutions
  • Services
    • Identity and access management
    • Offensive Security
    • Governance, Risk and Compliance
    • Virtual CISO
    • Awareness and Training Program
    • Cybersecurity Resilience Program
    • OT/ICS Operational Technology Cybersecurity
    • One-Stop-SMB’s
    • Blockchain Security Solutions
  • CyberCitadel
    • PTaaS
    • GRCaaS
  • About Us
  • Contact
  • Blog
  • Champions

Recent Posts

  • هل الفاكس عبر الإنترنت آمن؟ إليك ما تحتاج لمعرفته
  • الهجوم الحراري.. كيف يستغل القراصنة أجسادنا في اختراق بياناتنا؟
  • الأمن السيبراني في عصر الحوسبة الكمية.. التحديات والفوائد
  • ما هي الهندسة الاجتماعية وكيف يستغلها القراصنة في تنفيذ هجماتهم الفتاكة؟
  • إدارة الهوية والوصول : كيف تحمي أنظمة المؤسسة من الداخل؟

Recent Comments

  1. veilleuses on إدارة الهوية والوصول : كيف تحمي أنظمة المؤسسة من الداخل؟
Categories
  • Cybersecurity (61)
  • Design (54)
  • Development (61)
  • Startup (58)
  • Technology (58)
  • Uncategorized (9)
Recent Posts
  • هل الفاكس عبر الإنترنت آمن؟ إليك ما تحتاج لمعرفته
    April 30, 2025
  • الهجوم الحراري.. كيف يستغل القراصنة أجسادنا في اختراق بياناتنا؟
    April 27, 2025
  • الأمن السيبراني في عصر الحوسبة الكمية.. التحديات والفوائد
    March 26, 2025
Tags
Active Directory Penetration Testing AD Pentest API Penetration Testing api security API Security Assessment api testing application security Audits compliance CSF cybersecurity Cybersecurity Auditing Cybersecurity awareness Cybersecurity Culture Gap Assessment governance Governance Risk & Compliance governance risk and compliance Governancy Risk & Compliance GRC GRC As A Service honeypot IAM ICS Cybersecurity identity & access management intrusion detection system NCA Network Penetration Testing network security OT Cybersecurity OT ICS Cybersecurity PDPL penetration testing Personal Data Protection Law Risk Assessment SAMA SAMA CRFR SAMA MVC SAMA Self Assessment saudi arabia soc2 type 1 soc2 type 2 vCISO
Joushen
  • VP3P+2F , Thakaa center, Airport Road, , Riyadh 12356 , Saudi Arabia
Twitter Linkedin

Services

  • Governance, Risk and Compliance
  • Identity & Access Management
  • OT/ICS Operational Technology
  • Cybersecurity Resilience Program
  • Cybersecurity Awareness
  • One-Stop-Shop for SMBs
  • Virtual CISO
  • Offensive Security

Quick links

  • About us
  • Services
  • Solutions
  • Our Blog
  • Contact Us

Our Location

Copyright © 2023 Joushen by Sync Vortex. All Rights Reserved.

Privacy policy