fbpx
Women in tech

International Women’s Day: Breaking Barriers – How Women Without Tech Background...

0
For women who may not have a background in technology, breaking into IT and succeeding is not only possible but increasingly achievable with the right approach and mindset.

AI: Prompt Engineering will be a valuable future skill

0
As AI becomes more prevalent, prompt engineering will become an increasingly valuable skill for those who want to remain relevant in the workforce

Elon Musk’s condition to pay Twitter’s Content Creators is fifteen (15)...

0
From the arithmetic above, an average of 167,000 impressions a day are needed to achieve 15 million impressions in 90 days.

Microsoft Introduces Python into Excel

0
Python is one of the most popular programming languages today, loved by businesses and students alike and Excel is an essential tool to organize,...

NCC-CSIRT Warns of Pirated YouTube Software-related Malware

0
Furthermore, the advisory recommends installation of antivirus software with internet security and keeping it up to date,...

Did you know you can make a minimum of $200 (200...

0
With tailored training that exposes the secret of designing a website without writing a single html code and implementing appropriate search engine optimization (SEO), you can make a cool residual income that settles some of your bills.

University of Uyo: 2024/2025 Postgraduate Admissions into (PGD/Masters) in Cybersecurity, Data...

0
Applications are invited from suitably qualified candidates for admission into PGD and MSC in Cybersecurity, Data Sciences at the University of Uyo, for the 2022/2023 academic session.

AN OPEN LETTER TO THE AUTHORITY OF FEDERAL UNIVERSITY OF TECHNOLOGY...

1
RE: BSc (Hons) in Cybersecurity I would like the Authorities of Federal University of Technology Ikot Abasi (FUTIA) to apply for approval from National University...

NIN verification using your NIN slip will no longer acceptable, use...

0
International Standard Organisation (ISO) 270001 Information Security Management System (ISMS) requires that organisations assess information security risks, put in place robust security controls and...

FG suspends 5% tax on telecom services

0
The Federal Government yesterday suspended the controversial five percent excise duty on telecommunication services recently announced by the Ministry of Finance. Minister of Communications and...

Recent Posts

The Importance of Cyber Hygiene in a Modern Workplace

0
As technology continues to transform the business landscape, maintaining strong cyber hygiene practices is no longer optional – it's a critical component of organizational success and resilience

Cybersecurity in Government Organizations, The Case of OAGF Hack: A Call to Action

2
By Destiny Young, a Chartered Information Technology Practitioner and Cybersecurity Engineer Introduction The recent hack of the Office of the Accountant General of the Federation (OAGF)...

Zero Trust Architecture in a Remote World: Securing the New Normal

0
With remote work becoming increasingly common, organizations require a security model that can adjust to the unique challenges presented in this new setting

Apple vs Android:  Comparing and Contrasting Features

0
Some features may be available on certain device models or through third-party apps, even if they're not native to the operating system.

Navigating the Digital Age: Why Cybersecurity is Everyone’s Responsibility

0
Information security is everyone's business, it's your primary responsibility to protect your data from being compromised and stolen