PinnedDami OlusanyaProactive vs Reactive Approach: Building a Culture of Cyber Resilience through Incident Response…IntroductionAug 15Aug 15
PinnedDami OlusanyaInsider Threat Detection: Identifying Anomalies and Abnormal BehaviorIntroductionApr 17Apr 17
Dami OlusanyaEnhancing Cybersecurity Defenses: Unleashing the Power of Microsoft Security Copilot in Security…In the ever-evolving landscape of cybersecurity threats, organizations are seeking robust solutions that not only detect but proactively…Feb 1Feb 1
Dami OlusanyaSafeguarding the Season: Navigating the Cyber Wonderland of Christmas’Tis the season to be jolly, but in the information and technology landscape, it’s also the season to be vigilant. As the holiday season…Dec 13, 2023Dec 13, 2023
Dami OlusanyaPassword Security: Ethics, Its Importance, and The Future of Password SecurityBefore we dive into ethics and their importance. Let’s start from the basics by defining what password and password security is.Jun 10, 2023Jun 10, 2023
Dami OlusanyaRevolutionizing the Fight Against Cyber Threats: Exploring the Positive and Negative Impact of AI…Artificial Intelligence (AI) has revolutionized many industries and has the potential to greatly improve cybersecurity and business…Feb 4, 2023Feb 4, 2023
Dami OlusanyaPhishing is Still a Real Deal!!!In 2021, 83% of organizations reported experiencing phishing attacks. In 2022, an additional six billion attacks are expected to occur.Oct 31, 2022Oct 31, 2022
Dami OlusanyaSee Yourself in CyberIn conjunction with the Cybersecurity & Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA), this year’s…Oct 4, 2022Oct 4, 2022
Dami OlusanyaBehavioral Science and Data Science: a call for deeper integrationYou’re shopping for a birthday gift for your wife on Amazon Canada and heading for checkout when you see the note in your shopping cart…Jul 8, 2020Jul 8, 2020