Skip to content

ActivEdge Technologies – Old Site

Empower your business to achieve more!
  • Solutions
    • GRC
    • Security
    • Technology
    • Infrastructure
    • Covid-19
  • Reach us
  • Blog
Menu
  • Solutions
    • GRC
    • Security
    • Technology
    • Infrastructure
    • Covid-19
  • Reach us
  • Blog
Search
Close this search box.
Read more about the article Cybersecurity Threats in 2018: Cryptojacking, Ransomware and a Divided Zero-Day Market

Cybersecurity Threats in 2018: Cryptojacking, Ransomware and a Divided Zero-Day Market

  • Post author:admin
  • Post published:June 11, 2018
  • Post category:Security
  • Post comments:0 Comments

Data from the first quarter of 2018 revealed that the cybersecurity threats landscape is changing. As noted by CSO Online, cryptojacking continues to gain ground: In the first quarter of 2018,…

Continue ReadingCybersecurity Threats in 2018: Cryptojacking, Ransomware and a Divided Zero-Day Market
Read more about the article An Industry In Transition: Key Tech Trends In 2018

An Industry In Transition: Key Tech Trends In 2018

  • Post author:admin
  • Post published:June 7, 2018
  • Post category:News
  • Post comments:0 Comments

It’s the time of the year where everyone makes predictions for the following year. But rather than focus on predictions, I’d like to zero in on long-term trends that will…

Continue ReadingAn Industry In Transition: Key Tech Trends In 2018
Read more about the article What to do if your public cloud is hacked.

What to do if your public cloud is hacked.

  • Post author:admin
  • Post published:June 7, 2018
  • Post category:Infrastructure
  • Post comments:0 Comments

An effective disaster response plan and an up-to-date IT security strategy can help mitigate the effects of a cyber attack. It’s a nightmare scenario for any organisation - a public…

Continue ReadingWhat to do if your public cloud is hacked.
Read more about the article Don’t Be Held for Ransom: Five Strategies to Secure Healthcare Data Against Cyberattacks

Don’t Be Held for Ransom: Five Strategies to Secure Healthcare Data Against Cyberattacks

  • Post author:admin
  • Post published:June 6, 2018
  • Post category:Security
  • Post comments:0 Comments

Today’s headlines might lead you to believe that ransomware is a recent invention. Would you be shocked to learn that it’s almost 30 years old? Back in 1989, AIDS researcher…

Continue ReadingDon’t Be Held for Ransom: Five Strategies to Secure Healthcare Data Against Cyberattacks
Read more about the article Cyber sector tries to shake off ‘men in hoodies’ image

Cyber sector tries to shake off ‘men in hoodies’ image

  • Post author:admin
  • Post published:June 6, 2018
  • Post category:Security
  • Post comments:0 Comments

When it comes to attracting women into cyber security, the sector has a problem: images of men in hoodies sitting in dark rooms staring at screens. “That’s not a compelling…

Continue ReadingCyber sector tries to shake off ‘men in hoodies’ image
Read more about the article Penetration Tests Discover All Banks Are Susceptible to Web App Bugs

Penetration Tests Discover All Banks Are Susceptible to Web App Bugs

  • Post author:admin
  • Post published:June 5, 2018
  • Post category:Security
  • Post comments:0 Comments

A series of penetration tests found that every bank is guilty of web application vulnerabilities and insufficient network security measures. According to a recent report from Positive Technologies, Bank Attacks 2018,…

Continue ReadingPenetration Tests Discover All Banks Are Susceptible to Web App Bugs
Read more about the article 10 Business Email Compromise (BEC) Criminal Organizations Unmasked

10 Business Email Compromise (BEC) Criminal Organizations Unmasked

  • Post author:admin
  • Post published:June 4, 2018
  • Post category:Security
  • Post comments:0 Comments

Today, Agari has published “Behind the ‘From’ Lines: Email Fraud on a Global Scale,” a historic report that I believe is the first of its kind (but definitely not the…

Continue Reading10 Business Email Compromise (BEC) Criminal Organizations Unmasked
Read more about the article What’s the Biggest Security Threat for 2018? Malware

What’s the Biggest Security Threat for 2018? Malware

  • Post author:admin
  • Post published:June 1, 2018
  • Post category:Security
  • Post comments:0 Comments

What will be the most significant threat to cybersecurity teams in 2018? According to a May 2018 survey from information security company Trustwave, 22 percent of full-time information technology (IT)…

Continue ReadingWhat’s the Biggest Security Threat for 2018? Malware
Read more about the article Why Device ID May Not Be Enough to Stop Fraud

Why Device ID May Not Be Enough to Stop Fraud

  • Post author:admin
  • Post published:May 24, 2018
  • Post category:Antifraud
  • Post comments:0 Comments

Protecting your organization against fraud is a continuous game of cat and mouse. It seems like as soon as you implement a detection mechanism, the bad guys find a way…

Continue ReadingWhy Device ID May Not Be Enough to Stop Fraud

GDPR AND YOUR EMAIL CHANNEL : Four things you need to know

  • Post author:admin
  • Post published:May 21, 2018
  • Post category:GRC
  • Post comments:0 Comments

The European Union’s new privacy law, the General Data Protection Regulation (GDPR), comes into effect on May 25, 2018 and has many ramifications for any organization doing business in the…

Continue ReadingGDPR AND YOUR EMAIL CHANNEL : Four things you need to know
  • Go to the previous page
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • Go to the next page

Recent Posts

  • 4 Must-Haves for Data Governance Success in Financial Services
  • 6 Critical Email Security Practices For Business
  • How To Ransomware Proof your Backups
  • The 4 Pillars of Data Intelligence
  • Overcoming Patch Management Dilemma: A Strategy for Finding Peace Amidst the Chaos

Recent Comments

  • Gem on COVID-19 Raises Prospects for Robotic Process Automation
  • Gem on COVID-19 Raises Prospects for Robotic Process Automation

Company

Blog

Partners

About us

Facebook-f Twitter Linkedin Instagram

Solutions

Infrastructure

Security & IT GRC

Enterprise

IBM Showcase

Contact

+234 906 844 4440
info@oldsite.activedgetechnologies.com
ActivEdge Technologies Limited, No. 4b, Utomi Airie Avenue, Lekki Phase 1, Lagos.​

Subscribe to our Newsletter

© 2020 oldsite.activedgetechnologies.com

Kindly refresh your email. We sent links to download the resources

Kindly check and refresh your email for webinar details

Close popup