Taking stock of the internal audit profession
There are quite a number of skills needed for Internal Auditors of the future due to the continuous automation and emerging technologies.
Digital Privacy
Several recent events like the enactment of the EU GDPR, 2018, Data Protection Act, 2019, and other Data Privacy Laws that have been passed...
SOCIAL ENGINEERING- THE ART OF HUMAN HACKING
What is Social Engineering?
This in
simple terms is the act of trying to manipulate...
KENYA’S JOURNEY TO PROTECT CITIZENS ONLINE IS ONLY JUST BEGINNING.
by Alice Munyua
Kenya has joined the list of fewer than 30 African countries in enacting Data...
DOES YOUR WEB BROWSER CARE ABOUT ONLINE SECURITY?
It is hard to imagine that there are unseen people who are solely interested in harvesting and selling sensitive personal data obtained...
Cyber crime a major hurdle to confidential data storage, IoT
As the world prepares for a hyperconnected Internet of Things (IoT) landscape where billions of devices will be interconnected and zillions of...
Teach your staff to prevent data breach
Whatever size or industry you are in, your business is always at risk of a data breach. Depending on the security...
The dark side of Mobile Apps.
Mobile device security threats are on the rise and it’s not hard to see why. In 2019 the number of worldwide mobile phone...
6th AfricaHackOn Conference
AfricaHackOn invites you to the 6th Annual AfricaHackOn Cyber Security Conference that will be held on 12th - 16th August, 2019...
Metadata: Data About Data/Information
Hey guys, how are you doing?
Today i would like to touch on Metadata.
What is...