Online Safety For Kids The internet comes with unending possibilities, making life easier for everyone byNaomi AdamuAugust 6, 2023
CSEAN ‘s First CTF Competition (CTF 1.0) – CSEAN Cyber Secure Conference 2023 The Cyber Security Experts Association of Nigeria (CSEAN), the leading byCybersecfillAugust 6, 2023
Information Protection Strategy for Your Business. With so many data created every day and different devices used across bySimbiat SadiqJuly 29, 2023
Diary of Hackers Launches a Youth Led Cybersecurity Awareness and Capacity Building Initiative. With the ever-growing dependence on technology, without doubt, the internet byCybersecfillJune 22, 2023
ArticleFebruary 15, 2020 We rise by lifting others: 3 key mentoring tips for cyber & tech professionals If I have seen further than others, it is by standing upon the shoulders of byCybersecfill
ArticleFebruary 11, 2020 Towards a Safer Internet: Protecting Children Online Introduction The purpose of the Safer Internet Day is to raise awareness about byCybersecfill
BlogFebruary 10, 2020 Darknet: Source of Actionable Intelligence About The DarkNet – A little History The darknet didn’t make so much sense byHamzat Lateef
NewsJanuary 11, 2020 Inside Surebet247 Data Breach Surebet247 Data Breach Surebet247, one of Nigeria’s most popular online byCybersecfill
ArticleDecember 31, 2019 A Decade of Cybersecurity In Nigeria There have been a growth in the cyber-security landscape in Nigeria over the byHamzat Lateef
ArticleDecember 24, 2019 Privacy and Security for HealthTech in Nigeria With the healthtech growth in Nigeria, Privacy and security is necessary to bySimbiat Sadiq
BlogDecember 13, 2019 The Power of Use Case – Get Value from your SIEM Use cases gives you value for your SIEM byHamzat Lateef
BlogDecember 3, 2019 The first IAPP (Nigeria Chapter) KnowledgeNet Event A brief summary of the first IAPP (Nigeria Chapter) KnowledgeNet Event byHamzat Lateef
BlogNovember 29, 2019 Security Best Practices To Ensure Secure Cloud Environment The cloud environment comes with it's own security threats byHamzat Lateef