Decorative background

Latest Blog

Blog & articles

Data-driven Content on Cyber Security, Economies, Policy, and Innovations in Cryptocurrencies.

Region
Sort
Author
Cybersecurity.
Secure Our World and Enable Multi-Factor Authentication
In our present digital age, password alone is not enough to safe guard digital assets, this is because they are very susceptible to dictionary and brute force attacks. As one of the themes highlighted...
Cybersecurity.
Secure Passwords: Understanding, Creating, and Managing Your First Line of Defense
A password is a memorized string of characters known only to the user and used to verify their identity before granting access to a system. When a user enters their credentials, typically a username...
Cybersecurity.
Honeypots and Why It's a Necessity In Your Cyber Security Arsenal
A honeypot is a decoy system or network resource deliberately set up to mimic a legitimate target for cyber attacks, it's sometimes setup with not so obvious vulnerabilities. Its primary purpose is to...
Cybersecurity.
DNS Security: How to Keep The Backbone of the Internet Secure
DNS (Domain Name Server) is essentially the internet's phone book. When you enter a web address into your browser, this servers translate that domain name into an IP address (like 192.0.2.1), allowing...
Cybersecurity.
The Importance of Software Updates: Strengthening Your Digital Defense
Software updates are not just about new features; they’re essential shields against cyber threats. Learn what software updates are, why they matter, and how they protect you from security...
Cybersecurity.
How To Recognise and Stay Secured From Phishing Attacks
Phishing attacks are a pervasive and persistent threat in the digital landscape. By understanding what phishing attacks are, their effects, and how to identify and protect yourself against them, you...
Cybersecurity.
Social engineering as a Cyber Security threat
social engineering is not a cyber attack but the art of persuasion, a psychological manipulation that either start by gaining the trust or uses threat to force a victim into taking malicious actions.