How I survived a kidnap during an investigation assignment

Investigations are always exciting when you find a lead. You want to find out more and more. Around 2012, I was almost kidnapped at Nakumatti parking at Oasis Mall. I was following up on an investigation lead. People came in a Prado. As I approached to talk to the driver, a man opened a passenger

Read More »

The cybercriminals are collaborating, what about you?

If you are a cybersecurity researcher, you have probably heard of increasing cybercrime collaborations and partnerships to fast-track skills development, increase reach and capabilities to target deep pocket prospects and advanced governments. The power is in partnerships. Different ransomware developers have partnered up to share hacking techniques, malware codes, tech infrastructure and target lists. Different

Read More »

Acknowledge weaknesses to fix them

Many leaders spend a lot of time convincing themselves that they do not need help. Most technical people are fond of giving rosy reports about how great things are going. Yet, at the end of the year, when independent reports are in, statistics show that an average company loses about 5% of their annual revenue

Read More »

Ensuring confidentiality, integrity & availability of your ICT systems

No data/ system is completely safe! Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think you have taken all the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can no longer be left exclusively

Read More »

Three data privacy challenges

Today is a global data privacy day! Is there data privacy in reality? I have identified three challenges that prove privacy is just good for conferences. Here we go: Data privacy challenge 1: the entity called “marriage” Many married couples lack an understanding of data privacy. To most, data privacy applies outside the home. Marrieds

Read More »
Scroll to Top