Trending
- The Power of Use Case – Get Value from your SIEM
- The first IAPP (Nigeria Chapter) KnowledgeNet Event
- Security Best Practices To Ensure Secure Cloud Environment
- Cybersecurity Risk in Supply Chain Management
- Online Scams – How to Avoid Online Scams
- Facebook Hijacking – How to Prevent your Facebook from Being Hacked
- Protecting Health Information in Nigeria: Lessons From Nigeria HIV/AIDS Indicator And Impact Survey (NAIIS) Data Breach
- With the Internet,There is no Absolute Privacy
- Mobile Devices and Cyber Threats
- 2.59 Million Credit/Debit Card Transactions Exposed by Electronic Settlements Limited
Recent Posts
The Power of Use Case – Get Value from your SIEM
Use cases gives you value for your SIEM. With the right component of use cases such as event, sources, and…
Naira Marley’s Case Still in Court Over Alleged Cyber…
On may 10 2019, The Economic and Financial Crime Commision(EFCC) arrested two fast-rising Musicians in Nigeria. Afeez Fashola (aka Naira Marley) and…
A secure email gateway is essential to protecting your business from malicious content contained within emails by preventing them from reaching their…
NITDA Issues Licenses to 11 Data Protection Compliance…
NITDA has licensed 11 data protection compliance organization to ensure maximum protection of Nigerians data from possible breach .This has become…
Cloud Security – A look into CASB
Cloud Assess Security Broker
Cloud has come to stay but the security of cloud is what the end-users and security professionals are still worried about.…
Protecting Yourself Against Identity Theft
Identity theft is becoming a fast-rising crime on the internet and this happens for obvious reasons – most of us have made our valuable and personal!-->…
Data Loss Prevention Tools
Data loss prevention tools helps organization to protect there data against data loss. Data loss prevention controls access to…
Cybersecurity Awareness – A responsibility for all.
National Cybersecurity Awareness Month - We all have a Role to Play in Ensuring a Safer Internet
I am always excited about October and No it isn’t my…
Cyber Security as a Service (CSaaS)
Introduction
Cybersecurity is a crucial priority for governments, organisations and businesses, most especially Small…
Data Loss Prevention – A necessary Tool to combat Data…
What is Data Loss prevention (DLP)? Data loss prevention is the ability or practice of preventing exfiltration of sensitive data or critical!-->!-->!-->…
YouTube Violated Kid’s Privacy – Google to pay…
Google Fined $170 million for Violating Kid’s Privacy on YouTube
The Children Online Privacy Protection Act (COPPA) rule requires child-directed websites…
Credential stuffing is a type of attack where stolen account credentials which comprises of username,passwords and email addresses are used to accomplish…
Privilege Escalation Vulnerability Discovered in Trend Micro…
Peleg Hadar, a security researcher at safe breach Labs has discovered a vulnerability in the Trend Micro Password Manager software.
About Trend Micro…
Popular Posts
No event found!