Ransomware Payments and the Pivotal Factors Behind it’s Decline

Did you know that payments to ransomware operatives and cyber attackers fell by a whooping 35% in 2024? That is a decline from $1.25bn in 2023 to $813.55m. While this is welcoming news for the cybersecurity community, it is important to understand factors surrounding these events. Are ransomware payments likely to rise again or is this decline because of…

Read more

How Generative AI Elevates Cybersecurity Efforts: The Use Case of Microsoft Security Copilot

With the vast amount of data organizations hold and the complexity of IT infrastructures, it can be challenging to navigate various data streams to make informed and timely decisions. Indeed, organizations need to address security challenges they face in an efficient manner. However, a lack of skilled talent, visibility into security issues and working at human speed puts many…

Read more

The role of Cloud Security Certifications in securing the cloud

Cloud security is revolutionizing the corporate community, and its influence cannot be overstated. As more businesses migrate to the cloud, the importance of cloud security has become vital. In fact, according to cloudzero.com, 95% of companies are moderately to extremely concerned about cloud security.  This concern is justified, considering that cybercrime costs an organization about $13m. With this in…

Read more

Strong Reasons to use Biometrics as a second form of Authentication

Over the last couple of years, we have learnt a lot about implementing multifactor authentication (MFA) to strengthen the authentication process. Our identities on productivity apps, social media, email, banking apps and work environments requires strong verification. More so in a world we work, dialogue and collaborate virtually on the internet. What methods of authentication are available and why…

Read more

Excellent Tips for Good Cyber Hygiene

Now more than ever, it is important to stay vigilant and not lose guard against cyber criminals. Why? because they are constantly on the lookout to exploit vulnerabilities generated through human empathy, negligence or neglect. Articulated in this article are good cyber hygiene practices when implemented thoughtfully, prevents users from revealing personal information, compromising data or unwillingly parting away…

Read more

Three Reliable Tips to Secure Entry Level Cybersecurity Jobs

Did you know that a job advertisement is a request for interest? Did you also know that the potential employer has specific things they are looking for in an ideal candidate?  As a new entrant in the cyber industry, how can you confidently satisfy these requirements?  Over the weekend, I hosted a webinar where I invited my friend Priscilla…

Read more

The Exciting Role of Artificial Intelligence (AI) in Cybersecurity

So, the other day, my gym buddy and I were having a discussion on gaining muscle mass and he mentioned using ChatGPT for dietary and nutrition counsel. This struck me as a classic example of the broad use and quick adaptation of Artificial Intelligence (AI) in our everyday lives.  It took X (formerly Twitter) 2 years and Instagram 2.5…

Read more

How the Dark Web Affects You

Did you know that there are various aspects of the internet you interact with daily? You most likely use the “safe” and visible part of the internet for web browsing, accessing email and social media. How about other parts of the internet you hardly interact with? It may hold valuable information about you and have it on sale at…

Read more

Accessing Cyber Opportunities in Industrial Control Systems

Have you stopped to consider the things around you and how they operate? The things that get you from here to there and those things that help meet our daily needs. Consider the equipment used in the manufacturing industry like food and beverage production, and critical infrastructure such as power generation, and transportation. How will any form of cyber-attacks…

Read more