Studying Cybersecurity in Nigeria – What Next?
I spent a lot of time thinking of the perfect title for this blog . I was stuck between “Getting…
I spent a lot of time thinking of the perfect title for this blog . I was stuck between “Getting…
Developers who once spent days debugging a single function of code can now spin up entire applications in an afternoon….
Malicious browser extensions have become a persistent problem for organisational security teams, and one that doesn’t get nearly enough attention….
Not long ago, creating a convincing fake video or voice recording required serious technical skill. Today, widely available AI tools…
AI and the New Face of Sextortion There was a time when sextortion followed a predictable pattern which usually involved…
Corporate espionage is the practice of illegally or unethically obtaining a company’s confidential information, trade secrets, or proprietary knowledge for…
Single Sign-On (SSO) has become one of the pillars of modern identity and access management. Instead of remembering multiple usernames…
Earlier this year, Kaspersky reported a phishing technique that reflects a familiar pattern in modern cyberattacks: abusing trusted platforms to…
In cybersecurity, the goal has never been to prevent every attack. The real objective is ensuring the organisation can keep…
For years, organisations have struggled to balance strong security with everyday usability. Security controls only work if people can actually…
Get the latest update from our founder where she shares an unencrypted gist of her experiences as it relates to cybersecurity and her work.
Subscribe to our Newsletter, cancel at anytime.