The Basics of Identity and Access Management

Identity and access management (IAM) ensures that only authorized people have access to resources in the right context by managing roles and user…

Inside Surebet247 Data Breach

Surebet247 Data Breach Surebet247, one of Nigeria's most popular online betting has suffered a potential security and data breach which has put thousands…

Managing Logs in your Organization

Log management is very important in log monitoring. Effective log management is essential for both monitoring and compliance. There are various source of…

A Decade of Cybersecurity In Nigeria

There have been a growth in the cyber-security landscape in Nigeria over the last decade. From Nigeria Cybersecurity institutions to the NDPR

Web Application Firewall

Web application Firewall( WAF) is used to filter, block and monitor traffic. It is important to use WAF in protecting web applications from attack

Breach of Nigeria Data Protection Regulation by LIRS

The Lagos state government have violated the Nigerian Data Protection Regulation by allowing public access to the personal information of tax payers in…

How Credit/Debit Cards are Cloned / Preventing Card Cloning

credit/debit card cloning has increased the number of financial fraud in Nigeria. This is done by skimming and aided by rouge people in the financial…

Privacy and Security for HealthTech in Nigeria

With the healthtech growth in Nigeria, Privacy and security is necessary to protect data of patients in the case of cyber attacks. Cyber-attacks will…

Understanding Cyber Kill Chain – Adversary Needs an…

Cyber kill chain is used to describe various stages of cyber attacks.It goes through stage from gathering information to successfully infiltrating and…

The Power of Use Case – Get Value from your SIEM

Use cases gives you value for your SIEM. With the right component of use cases such as event, sources, and response, the SIEM will be a powerful tool

The first IAPP (Nigeria Chapter) KnowledgeNet Event

A brief summary of the first IAPP (Nigeria Chapter) KnowledgeNet Event. The first IAPP (International Association of Privacy Professionals) Nigeria…

Security Best Practices To Ensure Secure Cloud Environment

The cloud environment comes with it's own security threats.it is important for organizations to ensure that security best practices are adhered to.
Subscribe to our newsletter
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
You can unsubscribe at any time
No event found!
>