Why The Tech Industry Needs Women CISOs
Kerissa Varma, the first president of the recently established Southern Africa branch of Women in CyberSecurity (WiCyS), has spent more…
Kerissa Varma, the first president of the recently established Southern Africa branch of Women in CyberSecurity (WiCyS), has spent more…
Windows 10 has a fantastic set of built-in security tools. In recent years, Windows Defender, the built-in antivirus for Windows…
A Sacco Cyber Security Report 2018 by Serianu reports that 83 per cent of SACCOs manage their Cybersecurity in-house, a…
Sophos has unveiled new XGS Series firewall appliances with unrivaled performance and advanced protection against cyberattacks. The new appliances feature…
Time and time again, the conversation around cyber security emerges. It is like a flame that cannot be extinguished, except…
Organizations—especially large companies—often don’t learn about an intrusion or breach of their systems until an external party like a security…
Truecaller, has introduced a new identity solution for businesses to bolster safety and eliminate fraud. Dubbed Truecaller Business Identity, the…
Gbenga Odegbami’s journey to create an identity and access management (IAM) system to help stop rampant fraud in Nigeria started…
This is the third article in a series on the phenomenon of “beg bounty” hunters. The first two articles consider…
I recently wrote a Sophos News article on the whole phenomenon of “beg bounties” and invited organizations that had been…
No more posts available. Thank you for scrolling this far.
No more posts available. Thank you for scrolling this far.