Introduction You’ve probably heard a lot about Zero Trust Architecture (ZTA) lately. It’s being touted as this groundbreaking approach that’s…
cybersecurityA collection of 70 posts
For International Women’s day, we profiled two amazing Nigerian women making various strides in Cybersecurity. They shared some insights about…
I spent a lot of time thinking of the perfect title for this blog . I was stuck between “Getting…
CyberSafe Foundation, a Non- Governmental organization with a mission to facilitate changes and ensure a safer internet for all has…
Become CEH Master Using CEH Practical as Ticket. During the lockdown amidst COVID-19, the EC-Council certification body decides to make…
Working From Home – The New Normal Suddenly a new business normal has emerged and every enterprise, organization, business and…
In the Wake of a New Work Order COVID-19 is rapidly changing how we work, communicate, and interact with one…
Third Party Permissions and Session Management in Social Media It has become apparent that online account management is a hugely…
The cybersecurity industry is constantly growing. Organizations of all types are in an urgent need of hiring IT security professionals…