Tinubu signs data protection bill into law
The Nigeria Data Protection Act, 2023 provides a legal framework for the protection of personal information and the practice of data protection in Nigeria.
Cybersecurity is an investment, an attack causes financial losses and damage...
The cost of disaster management far outweighs the cost of threat prevention.
Mobile Safety: Ripping Through Technology | Destiny Young
Mobile phones have become an essential part of our lives. However, with the increasing use of mobile phones, the risk of cyber threats has also increased. Therefore, it is essential to take mobile safety seriously.
Four quick cybersecurity steps everyone must take right now
As convenient as Google Maps and Apple Maps are, it’s unnerving when your house and address number are visible to anyone on the internet. Here’s a secret. You can request a privacy blur over pictures of your home.
Data Privacy: the need for compliance with NDPR
Cyber security threat landscape has grown exponential in recent years, with hackers using sophisticated technology to compromise networks and users.
What if you misplace your phone, is your confidential data on...
Anti-theft allows you to remotely wipe all your data in the phone. You can sound alarm, trace the location, and lock the device.
STRIDE: Threat Modeling; Cybersecurity Risk Management Strategy
STRIDE ensures a comprehensive approach to threat modeling, covering various dimensions of system security.
Google Completes $5.4 Billion Acquisition of Mandiant
“We will retain the Mandiant brand and continue Mandiant’s mission to make every organization secure from cyber threats and confident in their readiness,” Google Cloud CEO Thomas Kurian
Governments, firms may suffer $30b ransomware exposures by next year
Besides, a Check Point Threat Intelligence report, disclosed that Nigerian businesses experience about 2,308 attacks across all industries sectors weekly.
The Seven (7) Layered Approach to Cybersecurity
A layered approach to cybersecurity is a comprehensive security strategy that involves multiple layers of defence to protect against cyber threats.