Transform your Business with Mobile Security
Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated…
Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated…
WHAT IS WANNACRYPT ( Wanna C r y / Wcry) ? A new ransomware attack, perhaps the largest so far, was designed to work only against…
You are an ethical hacker. In fact, you are a Certified Ethical Hacker. You dream about enumeration and you can scan networks in your sleep.…
Cyber crime, also called computer crime, is any illegal activity that involves a computer or network-connected device, such as a mobile phone. Crimes in which…
Authentication is the process of determining whether a person is who he or she claims to be. This process can occur in one of two…
A disaster recovery is a process or set of procedures to recover and protect a business in the event of a disaster. Such a plan,…
Organizational focus on cyber defense is more important than ever as cyber breaches have a far greater financial impact and can cause broad reputational damage.…
Now days many parents don’t have time to investigate what their children are doing on line which has in the end caused a lot of…
Certified Network Defender is a hands-on, instructor-led network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and…
Below is the presentation I made at Infosec 2014 seminar on 20th August 2014 at Hotel Africana Kampala, about the risks posed by social media.…
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.