Introduction The purpose of the Safer Internet Day is to raise awareness about how to use technology responsibly, respectfully, critically…
cybersecurityA collection of 69 posts
Cloud Computing Cloud computing is a buzzword for computers in the cloud where thunderclaps and rain falls… just kidding. The…
About The DarkNet – A little History The darknet didn’t make so much sense until 2000 with the release of…
Network security is an important aspect of cybersecurity and your business . This includes the use of firewalls, strong passwords, etc
Log management is very important in log monitoring. Effective log management is essential for both monitoring and compliance. There are various source of log –
There have been a growth in the cyber-security landscape in Nigeria over the last decade. From Nigeria Cybersecurity institutions to the NDPR
Cyber kill chain is used to describe various stages of cyber attacks.It goes through stage from gathering information to successfully infiltrating and compromising the organization
Use cases gives you value for your SIEM. With the right component of use cases such as event, sources, and response, the SIEM will be a powerful tool
A brief summary of the first IAPP (Nigeria Chapter) KnowledgeNet Event. The first IAPP (International Association of Privacy Professionals) Nigeria…