Security Operation Center (SOC)Planning on setting up a Security Operation Center commonly known as SOC, Let’s take a deep dive on what it entails…May 26, 2022May 26, 2022
Careers in Cyber SecurityCybersecurity experts work in every size company and industry to protect organizations from data breaches and attacks. Moreover, the demand…Apr 7, 2022Apr 7, 2022
OSINT: Open Source IntelligenceIf you’ve heard the name but are wondering what it means, OSINT stands for open source intelligence, which refers to any information that…Jan 11, 2022Jan 11, 2022
Zero TrustZero Trust has become one of cybersecurity latest buzzwords. It’s imperative to understand what Zero Trust is, as well as what Zero Trust…Oct 6, 2021Oct 6, 2021
Social Engineering Technique: The Watering Hole AttackThey say the human being is the weakest link when it comes to security. You can have the best security hardware, software and policies in…Aug 16, 20211Aug 16, 20211
Cryptocurrency and Blockchain Technology…(The Eureka Moment)I am sure everyone of you has ever heard of Bitcoin, Blockchain and the like. Have you ever taken time to understand what all these…Jun 26, 20211Jun 26, 20211
A motivation to all the women in technology out there.I have been reading a blog on successful women in technology, who have chosen to defy all odds and venture into the tech field despite it…May 15, 2019May 15, 2019