security

264

7 Cybersecurity Tips for Emerging Companies
Columns

7 Cybersecurity Tips for Emerging Companies

It’s a given these days that your company needs to have an online presence. That’s true regardless of its size, or…
Insider-related Cybersecurity Incidents in East Africa Increase by 55% in 3 Months
News

Insider-related Cybersecurity Incidents in East Africa Increase by 55% in 3 Months

The number of insider-related cybersecurity incidents in East Africa has increased by 55 percent in the last three months as…
Editor’s Pick: From Today Start Using Two-Factor Authentication
Apps & Software

Editor’s Pick: From Today Start Using Two-Factor Authentication

Security in all perspectives is very key and important. There are many features, measures, third-parties, among others that have been…
Companies with a Well-Developed Cybersecurity Culture will be at a Significant Advantage in 2020
Company News

Companies with a Well-Developed Cybersecurity Culture will be at a Significant Advantage in 2020

The availability of technological solutions via IoT and SaaS primarily has changed a lot between 2017 and 2019. They have…
Artificial Intelligence and Its Effects On the Business World as We Know It
Digital Impulse

Artificial Intelligence and Its Effects On the Business World as We Know It

Technology has been part of the business world for a long time. Artificial Intelligence (AI), the newest technology in the…
IT Authority Driving National Cyber Security Risk Assessment Workshop
Featured

IT Authority Driving National Cyber Security Risk Assessment Workshop

As part of the National Cyber Security Capacity Building, initiative under the Commonwealth Cyber Declaration agreed upon at the 2018…
Smart Door Lock Features You Need to Know
Privacy

Smart Door Lock Features You Need to Know

Smart locks are becoming sophisticated these days. It continuously develops and adds new security features which is always useful and…
Google unveils Adiantum, encryption for data on lower-end phones with insufficient processing power
Google

Google unveils Adiantum, encryption for data on lower-end phones with insufficient processing power

On the eve of this year’s Safer Internet Day, tech giant Google officially announced a new form of encryption called…
The Six Dumbest Hacks of All Time
Security

The Six Dumbest Hacks of All Time

Did you know that more than 2 billion computers were in use around the world in 2015? In 2017, manufacturers…
Why Early Detection of Cyber Threats is Crucial
Features

Why Early Detection of Cyber Threats is Crucial

There are estimates that by the end of 2019, data breaches and cyber attacks will have cost businesses $2.1 trillion.…
Back to top button
Do NOT follow this link or you will be banned from the site!
Close

Adblock Detected

Please disable your adblocker to continue accessing this site.