Uncategorized
Navigating the Nigerian Data Protection Act: How Data Management Principles Lead to Compliance

Navigating the Nigerian Data Protection Act: How Data Management Principles Lead to Compliance

The Nigerian Data Protection Act (NDPA) 2023 serves as a cornerstone for protecting the privacy and rights of individuals regarding their personal data. Complying with the NDPA requires more than just ticking boxes; it demands a shift towards responsible data management practices. This piece leverages South African experience of PoPIA compliance, exploring how fundamental principles […]

Uncategorized

Top 10 list of dark web activities that indicate a breach

Despite increased security budgets and better defenses, organizations are losing the battle against cyber attacks. According to the 2018 Cost of Data Breach Study: Global Overview by Ponemon Institute and IBM Security, data breaches continue to be costlier and result in more consumer records being lost or stolen, year after year. This year the report found that the average […]

GRC Infrastructure Security Technology Uncategorized

ActivEdge Technologies Advanced in Ixia Technical Knowledge

In today’s technology world, computers and computer networks are attacked in attempts to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of an asset, these attacks are referred to as a cyber-attack. And it is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or […]