NBA Elections: Addressing The Increasing Spate of Data…

What is Happening? “Okay so this is no longer funny and is a data protection issue. Who in the NBA released our phone numbers to candidates to keep…

Managed Security Service Providers – A Fast and…

Working From Home - The New Normal Suddenly a new business normal has emerged and every enterprise, organization, business and government agencies are…

Social Media Security Series: Part 2

2-Factor Authentication, and other Security Features Several Months ago, when I conceived this series, I never thought I would need to address aspects of…

COVID-19: Security in the Wake of a New Work Order

In the Wake of a New Work Order COVID-19 is rapidly changing how we work, communicate, and interact with one another. Some private companies, public…

Social Media Security Series: Part 1

Third Party Permissions and Session Management in Social Media It has become apparent that online account management is a hugely neglected part of our…

Why Cybersecurity Is The Most Rewarding Career?

The cybersecurity industry is constantly growing. Organizations of all types are in an urgent need of hiring IT security professionals to protect any data…

We rise by lifting others: 3 key mentoring tips for cyber…

If I have seen further than others, it is by standing upon the shoulders of giants. These wise words of Sir Isaac Newton have been my truth. Have you ever…

#NOGOFALLMAGA RELEASES FREE eBOOK SNIPPET TO MARK 2020 SAFER…

Tuesday, February 11, 2020 – LAGOS, NIGERIA - To commemorate the 2020 Safer Internet Day, Cybersafe Foundation is pleased to release for free downloads, a…

Towards a Safer Internet: Protecting Children Online

Introduction The purpose of the Safer Internet Day is to raise awareness about how to use technology responsibly, respectfully, critically and creatively.…

Cloud Security for Small and Medium scale Enterprises

Cloud Computing Cloud computing is a buzzword for computers in the cloud where thunderclaps and rain falls… just kidding. The concept of cloud computing…

Darknet: Source of Actionable Intelligence

About The DarkNet - A little History The darknet didn’t make so much sense until 2000 with the release of the Freenet. It gained much popularity in 2002…

Cyber Threat Intelligence

Why Threat Intelligence? The power to predict future attacks even before they reach targeted networks can help organizations prioritize their responses,…
Subscribe to our newsletter
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
You can unsubscribe at any time
No event found!
>