Busting the Hype: Zero Trust Architecture Isn’t That Complicated
Introduction You’ve probably heard a lot about Zero Trust Architecture (ZTA) lately. It’s being touted as this groundbreaking approach that’s…
Introduction You’ve probably heard a lot about Zero Trust Architecture (ZTA) lately. It’s being touted as this groundbreaking approach that’s…
The Cyber Security Experts of Nigeria (CSEAN) an advocacy group on all matters and challenges faced by informant security in Nigeria has…
CyBlack is calling for submission for it’s first cybersecurity innovation showcase. This is a virtual event aimed at spotlighting the most…
For International Women’s day, we profiled two amazing Nigerian women making various strides in Cybersecurity. They shared some insights about…
There are a million tips on how to keep a startup afloat on the Internet. Usually, advisers draw attention to…
The Nigerian Police Force (NPF) has arrested 11 alleged members of a prolific cybercrime network as part of a national…
Multi-factor authentication is a way to verify that someone is who they say they are because two or more means…
What exactly does an Indicator of Compromise do and what does it mean…? An Indicator of Compromise( IoC) is a…
The new year is a new opportunity for us to rewire our digital life. A very important part of this…
Get the latest update from our founder where she shares an unencrypted gist of her experiences as it relates to cybersecurity and her work.
Subscribe to our Newsletter, cancel at anytime.