NIST Releases the Draft of Cybersecurity Framework 2.0 and introduces fundamental...
A cybersecurity framework is a structured approach or set of guidelines that organizations use to manage and improve their cybersecurity posture. These frameworks provide a structured methodology for identifying, assessing, and managing cybersecurity risks and ensuring the confidentiality, integrity, and availability of information and systems.
Destiny Young | Top ’25 Cybersecurity Star of the Year’
"I have been actively involved in the campaign to ensure a safe internet by way of my contributing articles on cybersecurity and data privacy." - Young, D
Cybersecurity tops the list of concern as INEC team met with...
INEC Team led by Prof. Mahmood Yakubu and @IFES1987 tech partners from Google and Microsoft, at a meeting held at the IFES HQ, Arlington, Virginia on Wednesday.
Build a Career in Cybersecurity: From a Newbie to an Elite-class...
Building a career in cybersecurity requires dedication, continuous learning, and a passion for protecting digital assets.
BREAKING: NUC Restructures Nigerian Universities Computing Programme into Distinct Disciplines; Cybersecurity,...
Quite notable is the splitting of Computing into Cybersecurity, Software Engineering, Data Science, Information and Communication Technology, Information Technology, Information Systems, and Computer Science
Nigeria: Personal Data Privacy; Matter Arising
Data Privacy focuses on the rights of individuals, the purpose of data collection and processing, privacy preferences, and the way organizations govern personal data of individuals
Embracing Zero Trust in Cybersecurity: A Strategic Approach for Enhanced Cyber...
Embracing Zero Trust in cybersecurity is not just a best practice; it is a strategic imperative for organizations seeking to fortify their defences against evolving cyber threats.
How An Attacker Can Hack Your Fingerprint
If the potential victim swipes the screen during a call, the attacker can reconstruct parts of the fingerprint from the sound it makes.
We recorded over 12.9 million cyberattacks on presidential poll, says FG
During this period, a series of hacking attempts were recorded, including Distributed Denial of Service (DDoS), email and IPS attacks, SSH Login Attempts, Brute force Injection attempts, Path Traversal, Detection Evasion, and Forceful Browsing.
CYBERSECURITY – NITDA WEBSITE HACK; WHY ISO27001 IT SECURITY CONTROLS ARE...
The threat actors exploited a vulnerability in NITDA's web server database and were able to modify the website's [index.html] - a default page in a website's directory.