Are you an effective Cybersecurity/ I.T Manager?
As organizations strive to ensure the Confidentiality, Integrity and Availability of their systems, they go out of their way to hire Cyber security professionals (I.T…
As organizations strive to ensure the Confidentiality, Integrity and Availability of their systems, they go out of their way to hire Cyber security professionals (I.T…
Are you aware of what’s trending in the technology of mobiles today and the security niches that arise out of lack of knowledge on what…
The Institute of Forensics and ICT Security (IFIS) has been providing training to organizations in setting up an effective Business Continuity and Disaster Recovery plan…
Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data security also protects data from…
The practice of sending out mass emails that are fraudulent in nature is referred to as Phishing. These emails masquerade as legitimate emails from credible…
Banking has gone more electronic, it has become more vulnerable. Robbing a bank used to require a gun and a gateway car. Now hackers can…
Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated…
Authentication is the process of determining whether a person is who he or she claims to be. This process can occur in one of two…
Intellectual property theft involves robbing people or companies of their ideas, inventions, and creative expressions. It can include everything from trade secrets and proprietary products…
Organizational focus on cyber defense is more important than ever as cyber breaches have a far greater financial impact and can cause broad reputational damage.…
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.