Technology Intertwined with Human Behaviour; What are the Implications?
In this digital generation, the great shift to mobile devices and technology adoption has tremendously changed our mode of interaction. How we use these devices…
In this digital generation, the great shift to mobile devices and technology adoption has tremendously changed our mode of interaction. How we use these devices…
Have you or your organization been a victim of a cyber incident or experienced a data breach? What kind of breach did you encounter? Did…
As organizations traverse the setbacks brought about by COVID-19 and the need to stop its vast spread, many have resorted to a routine of working…
From ages past, there has always been the calamitous possibility for a colleague to be shockingly revealed as the ‘wolf in sheep’s clothing’, and we…
Why attend the #CSRM19? Are you too secure to be hacked? If you or any of your team member has Internet access or use social…
The current internet usage stands at 4.4billion users Worldwide, with Africa alone taking 525million users as of June 2019 (Internet World Stats). Uganda herself loses…
Diploma in Cyber Security and Forensics pioneer class at Institute of Forensics & ICT Security on 12th August 2019 orientation talk by Mustapha B Mugisa.…
Diploma in Cyber Security and Forensics pioneer class at Institute of Forensics & ICT Security on 12th August 2019 orientation talk by Mustapha B Mugisa.…
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.