PinnedVictor ChikezieThe Role of Hypervisors in Cloud Computing: An Overview of AWSWith the cloud, businesses no longer need to plan for and procure servers and other IT infrastructure weeks or months in advance. Instead…May 15May 15
PinnedVictor ChikezieHow Internet cookies affect PrivacyBefore you accept your next cookie 🍪 Oct 6, 20222Oct 6, 20222
Victor ChikezieThrowback Attack: Zero-Attack and Operation AuroraHow “Operation Aurora”leveraged a Zero-Day exploit for a large-scale cyberattack. Apr 23Apr 23
Victor ChikezieGoogle is erasing billions of Incognito browsing Recordfollowing a $5bn class-action settlementApr 3Apr 3
Victor ChikezieThe cyberattack threatening efficiency in the US Healthcare sector.But stakeholders still resist cybersecurity rules.Mar 20Mar 20
Victor ChikezieAirbnb bans indoor security camerasAirbnb bans the use of indoor security cameras starting April 30Mar 12Mar 12
Victor ChikezieEU Commission’s Use of Microsoft 365 Breaches GDPR Data Protection RulesEDPS Directs Immediate Compliance Measures by December 2024Mar 11Mar 11
Victor ChikezieUnpacking NIST Cybersecurity Framework 2.0Key Insights from NIST Cybersecurity Framework 2.0Feb 28Feb 28
Victor ChikezieWhat kind of security vulnerability does a QR code present? — Alert, “Quishing” on the rise!I was preparing for a tech conference sometime in 2023, and I wanted to quick and easy way to connect with people at the conference with…Jan 28Jan 28
Victor ChikezieChatGPT, AI and Privacy.Insightful takeaways from John Farrell on harnessing the potential of AI while protecting our privacyOct 28, 2023Oct 28, 2023