Blog Image

Social Engineering, the Flaws of Human Error, and Methods to Defend from It

1326
“Hi, my name is Samuel Gills, I’m one of the lead database engineers for (insert company name here). Our database for employee identification crashed overnight and we need to verify some information to ensure...
Blog Image

How technology drives Innovation for Financial inclusion & more…

2288
“LEARNING IS NOT ATTAINED BY CHANCE, IT MUST BE SOUGHT FOR WITH ARDOR AND ATTENDED TO WITH DILIGENCE.” ―ABIGAIL ADAMS The lesson is to keep learning with diligence. For a daily dose on Technology, Finance,...
Blog Image

Why Encryption is Critical to Everyday Life?

1794
You type in passwords almost every single day, the most basic form of encryption used in your life. Yet the question remains: how safe is that password? Well if you happen to use a...
Cellphone displaying VPN logo

How to shield personal data from evil doers

1364
Digital privacy is practically a misnomer. The list of companies not hacked seems shorter than those attacked.  Dentin Waweru might not agree with the exaggeration, but cybersecurity is a concern. The software engineer and freelance...
Blog Image

3 Ways to Protect Against Man-In-The-Middle Attacks

7314
A man-in-the-middle attack is one where both the client and the server are victims. The attacker sits virtually between both parties and intercepts communications between the two. Therefore, all information passed from one end...
Blog Image

America Under Fire — US Gov. Solarium Cybersecurity Report Sounds The General Alarm

1561
A bi-partisan report sends a dire warning to be heeded by all Americans. The US is under sustained cyber-assault. Time to unite behind a common strategy. "Our national security is now inexorably linked to cybersecurity" -...
Blog Image

The Next Era of Tech

1486
Quantum Computing. It seems like that is the BIGGEST buzzword after artificial intelligence. However, a lot of the resources I used to try to understand the concepts of quantum computing were difficult to understand quickly....
Blog Image

How PCI DSS Compliant Businesses Can Still Be Breached?

1216
The recent Verizon PCI Compliance Report highlighted that there’s a link between PCI DSS-compliant organizations and their ability to ward off cyber-attacks. Even though PCI DSS got implemented more than 12 years ago, cybercriminals...
Blog Image

How to Effectively Prepare for Cisco CCNP Routing and Switching Exams

1829
What is CCNP Routing and Switching? CCNP Routing and Switching is a professional-level networking certification. To apply for the CCNP credential, the candidates must have already taken and passed the tests for CCNA Routing and...
Machine Learning

Five Data Science and Machine Learning Trends That Will Define Job Prospects in 2020

6807
Data Science and ML have been one of the most talked-about trends in 2019 and without any surprise, they will continue to be so in 2020 as well. From shopping online, hailing rides, ordering food...
Blog Image

Business Security Integration Trends to Invest in Now and Beyond

3392
In 2017, a report by Statistic Brain revealed that employee theft costs businesses about $50 billion every year, according to the CNBC website. Common security issues within an organization involve computer systems and customer information....
Blog Image

Global Trends in Fintech Technology

2176
Countries may have locked up their borders to mitigate the COVID-19 pandemic, but local and international trade must go on. Innovations such as cloud-based technology, AI, and fintech have stepped in to handle the...
Blog Image

The Futility (And Hope) Of Cybersecurity In Today’s Organizations

1955
Organizations continue to cast their unprotected and sensitive data around while spending millions on cybersecurity to keep it protected and contained. The result is a cybersecurity crisis that cripples individuals, companies and nations. One...
Blog Image

Who Cares for Healthcare? Facing the Biggest Cybersecurity Challenges

444
Since the beginning of the global COVID-19 pandemic, cybercrime has increased by 600%. It is not surprising, that the healthcare industry was one of the most vulnerable ones to cyberattacks in 2020 and 2021. In fact,...