Studying Cybersecurity in Nigeria – What Next?
I spent a lot of time thinking of the perfect title for this blog . I was stuck between “Getting…
I spent a lot of time thinking of the perfect title for this blog . I was stuck between “Getting…
What is out-of-band (OOB) ? In information security, out-of-band (OOB) refers to the use of a separate, independent communication channel…
Cyber risk is a core business concern. It affects operations, supply chains, customer trust, and regulatory exposure. As a result,…
Generative AI tools have quickly become part of everyday work. People use them to write emails, fix errors, summarize documents,…
The Register reported that the UK Information Commissioner’s Office (ICO) has issued a £1.2 million fine against LastPass following a…
One of the most dangerous ways attackers break into an organization today is through the service desk. People often imagine…
The holidays bring joy, travel, and plenty of shopping. They also bring scammers who know people are distracted, tired, and…
Over the past year, phishing has changed in a way many people are still struggling to understand. What used to…
When people talk about cybersecurity, the conversation often jumps straight to tools, threats, and technology. But one thing many organizations…
A troubling case out of India is shining a harsh light on just how unsafe poorly secured CCTV systems can…
Get the latest update from our founder where she shares an unencrypted gist of her experiences as it relates to cybersecurity and her work.
Subscribe to our Newsletter, cancel at anytime.