- The Basics of Identity and Access Management
- Inside Surebet247 Data Breach
- Managing Logs in your Organization
- A Decade of Cybersecurity In Nigeria
- Web Application Firewall
- Breach of Nigeria Data Protection Regulation by LIRS
- How Credit/Debit Cards are Cloned / Preventing Card Cloning
- Privacy and Security for HealthTech in Nigeria
- Understanding Cyber Kill Chain – Adversary Needs an Insider
- The Power of Use Case – Get Value from your SIEM
The Lagos state government have violated the Nigerian Data Protection Regulation by allowing public access to the personal information of tax payers in…
credit/debit card cloning has increased the number of financial fraud in Nigeria. This is done by skimming and aided by rouge people in the financial…
Cyber kill chain is used to describe various stages of cyber attacks.It goes through stage from gathering information to successfully infiltrating and…
A brief summary of the first IAPP (Nigeria Chapter) KnowledgeNet Event. The first IAPP (International Association of Privacy Professionals) Nigeria…
The cloud environment comes with it's own security threats.it is important for organizations to ensure that security best practices are adhered to.
No event found!