I think one of the biggest changes we’ve seen in the last few years is how work has shifted. You…
cybersecurityA collection of 71 posts
Introduction You’ve probably heard a lot about Zero Trust Architecture (ZTA) lately. It’s being touted as this groundbreaking approach that’s…
For International Women’s day, we profiled two amazing Nigerian women making various strides in Cybersecurity. They shared some insights about…
I spent a lot of time thinking of the perfect title for this blog . I was stuck between “Getting…
CyberSafe Foundation, a Non- Governmental organization with a mission to facilitate changes and ensure a safer internet for all has…
Become CEH Master Using CEH Practical as Ticket. During the lockdown amidst COVID-19, the EC-Council certification body decides to make…
Working From Home – The New Normal Suddenly a new business normal has emerged and every enterprise, organization, business and…
In the Wake of a New Work Order COVID-19 is rapidly changing how we work, communicate, and interact with one…
Third Party Permissions and Session Management in Social Media It has become apparent that online account management is a hugely…
