Home » Security » Page 45

Security

DPR: Market forces should determine gas prices

File Photo The Department of Petroleum Resources (DPR) has advocated that market forces should be allowed to determine gas prices to guarantee the security of supply and demand of the commodity. Mr Sarki Auwalu, the Chief Executive Officer, DPR, disclosed this while presenting keynote address at the pre-summit conference on “Decade of gas’, in Abuja, on Monday. Auwalu said that the right and market-based pricing of gas was critical, as it would assure producers of returns on their investments. He also outlined five critical levers for gas development, especially as Nigeria moves to leverage its abundant gas resources for national growth, diversification of the economy and to use gas as the fuel for economic transformation. According to him, the levers include availability, accessibility, a...

Yiaga Africa demands effective monitoring, evaluation of coronavirus vaccination

A Civil Society Organisation, CSO, Yiaga Africa, on Monday, demanded effective monitoring and evaluation of COVID-19 vaccination and also strengthening the nation’s health sector. This was stated by the Director of Programmes, Yiaga Africa, Cynthia Mbamalu, while speaking on the need for the vaccination to be guided by certain principles that would bring about the inclusion of all citizens in the process. Mbamalu said: “The conversation is important to ensure that the whole process of vaccination is guided by certain principles and every aspect of society is catered for. In the implementation of vaccines in Nigeria, we need to deploy effective monitoring and evaluation systems that will help document how well we have done, document the learning, and how we can improve on the system. “Beyon...

Why Cybersecurity is Crucial in the Age of Tap-to-Pay

Tap-to-Pay is by no means a new technological development, but thanks to the COVID-19 pandemic, it has become increasingly popular as a method of payment since it is ostensibly contactless. It is also a payment method that can be used even without a card, since many wearable devices such as smartwatches feature tap and go payment options. With rumours that Apple Pay will be launching in South Africa this year, it is likely to become increasingly available. However, this begs the question, what about security? When no physical card is required and often not even the authentication of a Personal Identification Number (PIN) for smaller transactions, who is responsible? The reality is that banks, merchants and users all need to play their part to minimise fraud and safeguard their money. Are c...

Ibrahim Gambari: We must not assume President Buhari alone can solve our problems

Ibrahim Gambari, chief of staff to the president, says Nigerians should not assume that the Muhammadu Buhari-led administration can solely solve the problems affecting the country. Gambari stated this on Saturday when he represented the president at the 2021 annual lecture of Arewa House, in Kaduna. Delivering the president’s message, Gambari called on Nigerians to put the nation first in all their dealings, as was done by the country’s founding fathers. He said good leadership will provide a platform for the nation to overcome its challenges and unlock the huge potentials of the country. Gambari also noted that there is a need to improve coordination and collaboration among leaders at all levels of government, adding that all hands must be on deck to steer the country towards the path of ...

Protecting the IT Landscape in a Borderless World

The evolution of technology has pushed the perimeter of organisations further and further towards the edge, and we no longer have the monolithic structures we did in the past. The cloud, the Internet of Things (IoT), even the COVID-19 pandemic accelerating the adoption of a work from home model, have contributed to what has, in effect, become a borderless world. This means that the traditional approach to security of locking down the perimeter is simply no longer enough. The perimeter cannot be easily defined, and the way in which we access services has fundamentally changed. Cybersecurity mesh has emerged as a framework to address this challenge, with a distributed security architecture that more effectively meets the challenges of today’s landscape. Trust no one With IT infrastructure so...

More than 90 killed in Myanmar in one of bloodiest days of protests

Security forces killed more than 90 people across Myanmar on Saturday in one of the bloodiest days of protests since a military coup last month, news reports and witnesses said. The lethal crackdown came on Armed Forces Day. Senior General Min Aung Hlaing, the junta leader, said during a parade in the capital Naypyitaw to mark the event that the military would protect the people and strive for democracy. State television had said on Friday that protesters risked being shot “in the head and back”. Despite this, demonstrators against the Feb. 1 coup came out on the streets of Yangon, Mandalay and other towns. The Myanmar Now news portal said 91 people were killed across the country by security forces. A boy reported by local media to be as young as five was among at least 29 people killed in...

U.S. Senate confirms Wally Adeyemo as deputy treasury secretary

The U.S. Senate has confirmed Adewale Wally Adeyemo as Deputy Secretary of the Treasury, making him the first Nigerian-American to hold the powerful job. Adeyemo, 39, has struck a hardline tone on China, vowing to fight what he called Beijing’s “unfair economic practices” and hold China accountable to international rules. He is expected to play a key role in shaping U.S. economic policy on issues ranging from financial regulation to relief for everyday Americans and U.S. sanctions on foreign governments. A former senior adviser at asset manager BlackRock Inc and the child of Nigerian immigrants, Adeyemo served as a top national security and economic adviser to Democratic former President Barack Obama and held senior jobs at the Treasury. The Senate on Thursday confirmed Adeyemo on a voice ...

Fixing Your Cybersecurity Issues 1 Next-Gen Firewall at a Time

Stefan van de Giessen, General Manager: Cybersecurity at Networks Unlimited Africa When did you last check your firewalls as a barrier to entry against cybercriminals? And, perhaps more importantly: does your organisation still rely on a legacy firewall, or has it upgraded to a next-generation firewall (NGFW)? And have you considered the ‘Broken window’ principle when looking at your internal cybersecurity posture, in order to have a positive effect on your business processes? These questions are posed by Stefan van de Giessen: General Manager: Cybersecurity at Networks Unlimited Africa, who says, “The broken window theory rests on the idea that a neighbourhood or community that appears to be orderly and well-kept will be less susceptible to crime. Conversely, one that has many broken wind...

3 Things to Consider When Implementing an Effective Zero Trust Access Strategy

The most secure network is one that has no connections. Of course, that idea is not only impractical, it defeats the purpose of a network. The reality is that no network is an island, and as businesses become more digital, networks inevitably become more complicated and dispersed. Today’s networks now have many “edges,” so it’s much harder than it used to be to create a single defensible boundary. In the face of these changes, the traditional network perimeter is dissolving, and it’s far more difficult to tell who and what can be trusted. To respond to increasing threats, best practices now stipulate a “trust no one, trust nothing” attitude toward network access. Protecting the network with this zero-trust access (ZTA) approach means that all users, all devices, and all web appli...

Group urges service chiefs to fish out criminal elements

Following the activities of armed bandits in the country, group has charged the new service chiefs to address the current Insecurity situation in the North East, particularly Maiduguri, which they noted,was the epicenter of insecurity in the country. By way of appeal the group urge the new security heads adopt a new strategy, hit the ground running by relocating to the theatre of the war against terrorists for at least six months in the first instance and not national tour. In a statement, Wednesday, the experts operating under the aegis of Coalition of Concerned Nigeria Security Experts noted that two months after the current security chiefs assumed office, insecurity was assuming a new dimension. In the statement by its National Coordinator, Prof. Otedola Adekunle and National Secretary,...

Minister: Nigerian government to establish micro enterprises in 774 local council areas

Dr George Akume, the Minister of Special Duties and Inter Governmental Affairs, on Wednesday said that micro enterprises will be established in the 774 Local Government Areas (LGAs) of the country. The Minister disclosed this in Abuja at the Association of Local Governments of Nigeria (ALGON) General Assembly with the Theme: Strategic Positioning for the Future: A New Era. “As a ministry, we have proposed the establishment of Micro, Small and Medium enterprises in the 774 local governments in Nigeria based on economic corridors. “We believe that this will create jobs and ensure improvement in the well-being of the local populace,’’Akume said. The minister, who was represented by Mr Simon Tyungu, Deputy Director, Office of the Minister, said that the establishment of the micro enterprise wa...

4 Tips to Protect Your Family Online

A recent survey revealed that 51.5% of South African children have been cyberbullied. “The reason for this is the increase in connected societies, more and more people are online, especially the youth,” says Simon Campbell-Young, co-founder and VP of global sales at Digimune. “There is clearly a lack of good cyber education and defensive tools. With this in mind, here are four tips to protect you and your family: 1. Remember that education is key This is the first awareness step. The vast majority of children have access to a wide variety of online devices — either shared or their own device — from a young age. By the age of 10, 30.5% of children have their own smartphone and 41.5% have access to a shared smartphone. It is thus imperative to take time to go about the internet – the good an...