Naira Marley’s Case Still in Court Over Alleged Cyber…

On may 10 2019, The Economic and Financial Crime Commision(EFCC) arrested two fast-rising Musicians in Nigeria. Afeez Fashola (aka Naira Marley) and…

Secure Email Gateway

A secure email gateway is essential to protecting your business from malicious content contained within emails by preventing them from reaching their…

NITDA Issues Licenses to 11 Data Protection Compliance…

NITDA has licensed 11 data protection compliance organization to ensure maximum protection of Nigerians data from possible breach .This has become…

Cloud Security – A look into CASB

Cloud Assess Security Broker Cloud has come to stay but the security of cloud is what the end-users and security professionals are still worried about.…

Protecting Yourself Against Identity Theft

Identity theft is becoming a fast-rising crime on the internet and this happens for obvious reasons – most of us have made our valuable and personal

Data Loss Prevention Tools

Data Loss Prevention Tools Data loss prevention tools helps organization to protect there data against data loss. Data loss prevention controls access to…

Cybersecurity Awareness – A responsibility for all.

National Cybersecurity Awareness Month - We all have a Role to Play in Ensuring a Safer Internet I am always excited about October and No it isn’t my…

Cyber Security as a Service

Cyber Security as a Service (CSaaS) Introduction Cybersecurity is a crucial priority for governments, organisations and businesses, most especially Small…

Data Loss Prevention – A necessary Tool to combat Data…

What is Data Loss prevention (DLP)? Data loss prevention is the ability or practice of preventing exfiltration of sensitive data or critical

YouTube Violated Kid’s Privacy – Google to pay…

Google Fined $170 million for Violating Kid’s Privacy on YouTube The Children Online Privacy Protection Act (COPPA) rule requires child-directed websites…

Credential Stuffing

Credential stuffing is a type of attack where stolen account credentials which comprises of username,passwords and email addresses are used to accomplish…

Privilege Escalation Vulnerability Discovered in Trend Micro…

Peleg Hadar, a security researcher at safe breach Labs has discovered a vulnerability in the Trend Micro Password Manager software. About Trend Micro…
Subscribe to our newsletter
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
You can unsubscribe at any time
No event found!
>