…Master of Business Administration (2015) from Wuhan University of Technology (People’s Republic of China), is certified in Cloud Infrastructure Technology, and holds a Bachelor of Science in Applied Physics with…
…Master of Business Administration (2015) from Wuhan University of Technology (People’s Republic of China), is certified in Cloud Infrastructure Technology, and holds a Bachelor of Science in Applied Physics with…
…cybersecurity. Through NUPI’s Centre for Cyber Security Studies we are concerned with norms and state behavior in cyber space, development assistance and capacity building, societal vulnerabilities, sovereignty and cyberspace, global…
…populations. To this end, the Institute’s mission is to ensure a human-centric response to cyber operations. The CyberPeace Institute tackles cyberattacks through a holistic approach based on our strategic objectives:…
…region. Given this, the GFCE has devised a two-tier approach: 1) bringing together the GFCE community and coordinating cyber capacity efforts in the African region, and 2) through the AU-GFCE…
The Global Forum on Cyber Expertise (GFCE) is delighted to welcome three new members to the GFCE Community. As of Monday 15th , the Governments of Uruguay, Pakistan and Samoa…
…and harm of cybercrime and protecting communities for a safer world by preventing, detecting, investigating and disrupting cybercriminals and their infrastructure. Under his leadership, INTERPOL’s Cybercrime Directorate achieved significant milestones,…
…Cybil through a silent procedure. While most of the content on Cybil is currently gathered through the GFCE community, the Cybil portal group – ASPI, DiploFoundation, FIRST, GCSCC and NUPI…
…where we hold majority stakes: Botswana 67.8%, Kenya 68.5%, Mozambique 98.7%, National Bank of Commerce, Tanzania 55% and Seychelles 99.8%. Through our Absa Cyber Security Academy we are building skills…
…Resistance – Focus on identifying the polymorphic and just-in-time malware. Device Security – Focus on growing class of malware that include inserts and attacks before the operating system starts, which endanger critical boot processes…