Combating Cyber Security Threats
New cybersecurity threats and breaches emerge each year. Even with unprecedented vulnerabilities such as Spectre and Meltdown, the approach to dealing with the risks they…
New cybersecurity threats and breaches emerge each year. Even with unprecedented vulnerabilities such as Spectre and Meltdown, the approach to dealing with the risks they…
Fraudsters have figured out how to break in to online accounts protected by two-factor authentication where the authenticating device is your mobile phone. They don’t…
It happens every single day—people open emails from unknown senders, click on mysterious links out of curiosity, and even print out sensitive information and leave…
Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is…
When it comes to Ugandans, there is a general feeling that Internet crime is an advanced type of crime that has not yet infiltrated the…
Cloud is the preferred solution for data storage, infrastructure and services on demand today. Penetration testers and ethical hackers are increasingly being called upon to evaluate the security of cloud-based…
Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data security also protects data from…
In today’s fast paced world, organizations have to rely more and more heavily on technology to remain competitive. Customers have come to expect organizations to…
It is a Monday morning. The alarm goes off. You raise your head and reach over to your phone. Time check, its 5:00am. You are…
Cyber-bullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and twitter to harass, threaten or intimidate someone. Cyber-bullying…
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.