I.T Security Controls
I.T Security professionals spend most of their time designing, executing, and managing security controls. Security controls are procedures and mechanisms that an organization puts in…
<%= domainName %>
<% } %> <% if ( link_success && ! link_error ) { %><%= link_title %>
<% } %> <% if ( link_success && ! link_error ) { %><%= link_description %>
I.T Security professionals spend most of their time designing, executing, and managing security controls. Security controls are procedures and mechanisms that an organization puts in…
As each day comes, Cyber-attacks and data breaches are increasing in the news and the types of cyber-attacks are becoming more varied and sophisticated. Malicious…
The current internet usage stands at 4.4billion users Worldwide, with Africa alone taking 525million users as of June 2019 (Internet World Stats). Uganda herself loses…
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.