Insights

Africa’s premier cyber and digital technology think tank

Cybersecurity

A Maturity Primer for Vulnerability Coordination

At the FDA Cyber Summit in Washington, DC, in January 2016, issues concerning the security of medical devices & patient records were discussed, and several resolutions were passed by key policy experts…
At the FDA Cyber Summit in Washington, DC, in January 2016, issues concerning the security of medical devices & patient records were discussed, and several…
Cybersecurity

CounterTerrorism Tradecraft in Polymorphic Threat Mitigation

For a while now, we have been inundated with news of breaches across the entire spectrum—from the enterprise to the public sector—and it seems it won’t abate anytime soon. The de facto reactionary…
For a while now, we have been inundated with news of breaches across the entire spectrum—from the enterprise to the public sector—and it seems it…
Cyber Attacks

Preventative Measures for the Next KRACK Attacks

If we have been very circumspect as consumers of the Internet, the vulnerability of Wi-Fi networks wouldn’t come as a surprise to us. Wi-Fi has long been a vulnerability vector and a…
If we have been very circumspect as consumers of the Internet, the vulnerability of Wi-Fi networks wouldn’t come as a surprise to us. Wi-Fi has…
Identity Security

Mitigating Identity Theft

Identity theft can simply be defined as the crime of obtaining another person’s personal or financial information in order to make unauthorised transactions, access accounts, create new accounts, or perform fraudulent activities.…
Identity theft can simply be defined as the crime of obtaining another person’s personal or financial information in order to make unauthorised transactions, access accounts,…
AML, Financial Crime, KYC

Dirty Money in a Digital World: Modernising Approaches to KYC, AML & Terrorist Financing

In the new digital economy, with the advent of digital banking and cash management, criminals have perfected the art of moving money across continents at the speed of light, and technological advances…
In the new digital economy, with the advent of digital banking and cash management, criminals have perfected the art of moving money across continents at…
Cybersecurity

Remediating a Security Incident

The early signs of a security incident are rarely black-and-white. Most individuals and organisations respond to security incidents in every imaginable way, and it’s always a knee-jerk reaction. To remediate a security…
The early signs of a security incident are rarely black-and-white. Most individuals and organisations respond to security incidents in every imaginable way, and it’s always…
Risk Management

Prioritising Risk Across the Cyber Attack Surface

The severity of network vulnerabilities is alarming, and organisations are becoming overwhelmed. In 2019, a total of 17,313 new vulnerabilities were disclosed—this means that security teams had to deal with 47 new…
The severity of network vulnerabilities is alarming, and organisations are becoming overwhelmed. In 2019, a total of 17,313 new vulnerabilities were disclosed—this means that security…
Cybersecurity

Rethinking Risk and Enterprise Security in a Fierce Threats Landscape

Amid the drive to achieve holistic digital transformation, the modern security landscape is rapidly evolving. The emergence of apps, cloud services, big data, and mobile technology, though revolutionary, is opening new vistas…
Amid the drive to achieve holistic digital transformation, the modern security landscape is rapidly evolving. The emergence of apps, cloud services, big data, and mobile…

Join Us In Shaping Tomorrow

Whether you’re a policymaker seeking strategic advice, a business leader looking to fortify your digital defences, or an innovator with bold ideas, Africa Cyber Centre is your trusted partner. Together, let’s build a digitally empowered Africa that leads on the global stage.

For more information or to collaborate:
Send an email to cyber@afrcyber.org or call (+234) 8106077356