SubomiBig data Security in Cloud computingWe all utilize smartphones, but have you stopped to wonder how much data is generated in the form of texts, emails, pictures and videos…Mar 23, 2023Mar 23, 2023
SubomiAdvantages of SIEMSecurity Incident and Event Management helps organizations detect and handle security threats, but what exactly is the principle behind it…Feb 17, 2023Feb 17, 2023
SubomiMechanics of Password ProtectionPasswords are a simple tool to ensure confidentiality. What should users and developers need to keep in mind when handling passwords?Feb 17, 2023Feb 17, 2023
SubomiCYBERSECURITY POSTURE AND RISK ASSESSMENTWhat is Cybersecurity Posture, and how can you improve it? , before we begin discussing such things, we must begin by defining some words…Feb 17, 2023Feb 17, 2023
SubomiBET9JA ATTACK: A STORY OF EMPLOYER OR EMPLOYEE NEGLIGENCEOn the 6th of April, one of Nigeria’s leading sports betting companies was rocked with a ransomware attack. Regular visitors of the bet9ja…Jul 16, 2022Jul 16, 2022
SubomiCybersecurity 101When you think about cybersecurity what’s the first thing that comes to mind?, hacking into a “mainframe “, someone typing random stuff on…Dec 21, 2021Dec 21, 2021