As an Information Security Professional, I have taken a keen interest and followed closely the global reports of the Unisys Security Index (USI), for the past 4 years. Findings from…
Tag: articles

Information Security Governance: the cornerstone of effective information protection
By IIPGH0Information Security Governance (ISG) refers to the system through which an organization directs and controls its Information Security (InfoSec) activities. Just like corporate governance, ISG seeks to protect the interest…

Social Engineering; The Greatest Catalyst for Successful Cyber Attacks
By IIPGH0Social Engineering (SE) is the process of deceiving an individual or a group of people to take a certain action(s) or disclose sensitive information in favour of the perpetrator. According…

3 Areas Where We Must Harness the Transformative Power of Artificial Intelligence
By IIPGH0For most people, artificial intelligence (AI) is about robots; about some complex technology that is far away from them. This is true especially for people living in developing countries where…

Making sense of the COVID Pandemic; Education Post-mortem
By IIPGH0[dropcap]R[/dropcap]eshaping Our Educational System; Prioritising STEM Education. COVID-19 is not the first global pandemic the world has faced in recent history, but the implications and impact are unlike anything most…

The CIO Diaries: Selecting the right combination of cyber-security products
By IIPGH0After months of budget negotiations, you finally have management/board approval and a budget has been allocated to you. Now you are thinking of optimizing the costs of cyber tools and…

Automation, COVID-19 and Jobs
By IIPGH0In an incredibly competitive world where manufacturers and service providers scramble for customers, delivering quality products and services timeously at a relatively cheaper cost is imperative. Many companies are turning…