Sign in
Join
Home
News
Artificial Intelligence
Covid-19
Enterprise Mobility
Hardware
Industry News
Main story
Power
Software
Storage
Analysis
Blog
Videos
Product Reviews
Events
Magazines
Magazines
Reports
Presentations
Subscription
Orders
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Create an account
Privacy Policy
Sign up
Welcome!
Register for an account
your email
your username
A password will be e-mailed to you.
Privacy Policy
Password recovery
Recover your password
your email
Search
Thursday, February 25, 2021
Sign in / Join
Subscription
About Us
Services
Contact Us
My account
My Membership
Checkout
Cart
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Create an account
Privacy Policy
Create an account
Welcome! Register for an account
your email
your username
A password will be e-mailed to you.
Privacy Policy
Password recovery
Recover your password
your email
A password will be e-mailed to you.
CIO East Africa
Home
News
All
Artificial Intelligence
Covid-19
Enterprise Mobility
Hardware
Industry News
Main story
Power
Software
Storage
Data Science
Strathmore Launches Training For Data Scientists
News
Google And Facebook To Pay Australia For News Content
News
COVID-19 Has Changed IT Spending Priorities For Airports And Airlines
Security
Sophos Provides Next-Generation 5G PC Cybersecurity With Intercept X
Analysis
Blog
Videos
Product Reviews
Events
Magazines
Magazines
Reports
Presentations
Subscription
Orders
Home
Security
Security
Security stories, news and analysis.
Featured posts
Latest
Featured posts
Most popular
7 days popular
By review score
Random
Security
Beware! Cyber Attackers Now Disguise In Legitimate Tools
Lucian Constantin
-
August 13, 2020
Security
Integrate Technology To Survive The New Norm’
Security
Twitter VIP Account Hack Highlights The Danger Of Insider Threats
Security
Cisco’s SecureX Accelerates The IT Security Agenda
Security
Are You Secure In The Cloud?
Security
What Are Vulnerability Scanners And How Do They Work?
Lucian Constantin
-
April 11, 2020
0
Security
Beware Of The Ginp Android Banking Trojan That Milks Your Money
Molly Wasonga
-
March 24, 2020
0
Security
5 things to know about cybersecurity insurance
J.M. Porup
-
February 21, 2020
0
Security
Security vs. innovation: IT’s trickiest balancing act
Bob Violino
-
February 18, 2020
0
Security
ICT industry applauds Kenya’s data protection law
Molly Wasonga
-
November 21, 2019
0
Security
Offer Cyber Security as a service CSaaS
Molly Wasonga
-
October 19, 2019
0
Security
Siblings arrested in Italy’s worst cyberespionage operation ever
Andrea Grassi | IDG News Service
-
October 12, 2019
0
Security
Facebook to remove illegal content from the platform globally; EU court
Molly Wasonga
-
October 7, 2019
0
Security
Cybersecurity here are consequences
Staff Writer
-
September 26, 2019
0
Security
What does the future hold for passwords
Sid Chudasama
-
September 5, 2019
0
Security
CA report: fake mobile applications fuelling cyber fraud
Staff Writer
-
April 1, 2019
0
Security
Rwanda to focus on “Safe and Secure Services Online” during this...
Staff Writer
-
March 6, 2019
0
Security
Trend Micro: mounting cloud email threats to Office 365 require 2nd...
Staff Writer
-
March 6, 2019
0
Security
Gemalto, SCINTL awarded contract to supply Border Management System at Entebbe...
Staff Writer
-
January 18, 2019
0
Security
What is the future of authentication? Hint: It’s not passwords, passphrases...
Roger A. Grimes | CSO
-
October 4, 2018
0
Security
Trend Micro making strides to secure Africa’s cloud
Baraka Jefwa
-
September 4, 2018
0
Security
Join us at the Cloud and Security Summit
Staff Writer
-
March 21, 2018
0
Security
BlackBerry launches new Cybersecurity Product targeting automakers
Baraka Jefwa
-
January 16, 2018
0
Security
Turla unleashes fake Adobe installers in Eastern Europe
Staff Writer
-
January 12, 2018
0
Security
How to measure cybersecurity effectiveness — before it’s too late
Thor Olavsrud | CIO
-
August 31, 2017
0
1
2
Page 1 of 2
- Advertisement -
- Advertisement -
Your Name*
Your Email*
Subject
Your Message
×
Your Name*
Your Email*
Subject
Your Message
×
Your Name*
Your Email*
Subject
Your Message
×
Your Name*
Your Email*
Subject
Your Message
×
X Close