Cyber
0
-
Columns
6 Common Vulnerabilities in OT Environments and How to Address Them
The use of operational technology (OT) systems continues to grow. Thus, there’s a need for organizations to understand and address…
Read More » - News
-
Features
iHub to host discussions of the draft AU cyber security convention
The Nairobi iHub will host a panel discussion on the Draft African Union Convention that will focus on confidence and…
Read More » -
News Archive
Gaddafi’s death photos used as Scam, security experts
IT security and data Protection Company Sophos is warning of a malicious email attack, one of the first to capitalise…
Read More » -
News Archive
Google Finds Search Hijacking Virus on 1 Million Computers
Google plans to warn more than a million internet users that their computer is infected with a virus that intercepts…
Read More » -
News Archive
Pentagon Reveals 24,000 Files Stolen In Cyber-Attack
The Pentagon has disclosed that it suffered one of its largest ever losses of sensitive data in March when 24,000…
Read More » -
News Archive
China and the US: Sizing up for cyber war?
As senior US officials warn that cyber attacks on vital systems would be considered "acts of war" eliciting a real world…
Read More »