Is AI that Dangerous?

One can sense the fear of Artificial Intelligence (IA) in the reports and other comments watching the news in recent months. Although AI technology has been around for some time, it is a sizable unknown, and we are uneasy with its incomplete understanding of its functions. The concept of something we do not entirely understand…

Cybertheft in Africa

A new type of illegal activity emerged in Africa with a high Internet accessibility rate. This type of cybercrime is known in West Africa by different names: Yahooman, 419, Gaymans, etc… Cybercriminals pose a threat to the economy of Africa. Not only do these threats present challenges to businesses, but also, they affect the cyber…

An Excerpt From (Why is NIST SP 800-61r2 relevant in Security Operations Center).

Incident response significantly decreases the likelihood of hackers and intruders penetrating an organization’s data system and causing damage by stealing or corrupting the data. Essentially, an incident response ability rapidly helps in incident detection, cushioning against loss and destruction, restoring information technology services, and redressing the weaknesses exploited. An Excerpt From IR

Window to my world

Growing up deep in Africa, I did not have much as a child. I belonged to a low-income family in Togo that comprised several siblings. My mother traded convenient items in the market to make a living in the family. My dad is a mason by training but a farmer by choice. Although my parents…

Cyberattacks Strategy for Nonprofit Organizations

Abstract: Information system security managers (ISSM) in nonprofits face increased cyberattack cases because nonprofits mostly use basic technology due to their desire to save costs. It is important for nonprofit owners and managers to solve this problem because it exposes their organizations to hackers. Grounded in the general systems theory, the purpose of this qualitative…