Home
Articles
Events
NEWSLETTERS
Latest Updates
Cyberforum
Learning
Speaker
CIIP Community
Events
Newsletter
CyberForum
About CIIP
Principles Guidelines
Resources
Principles Guidelines
Discussions
Home
Articles
Events
Latest Updates
Cyberforum
Learning
Speaker
CIIP Community
Events
Newsletter
CyberForum
About CIIP
Principle Guideline
Resources
Principles Guidelines
Discussions
Articles
A Study on CCTV Installation And Recommendation From Developed Nations Perspective
2 September 2021
Articles
Emerging technologies and the 4th Industrial Revolution (IR 4.0) has brough...
Read More
Business Continuity And COVID-19
2 September 2021
Articles
Business continuity is the advance planning and preparation undertaken to e...
Read More
ENSURING INFORMATION SECURITY AND SERVICE CONTINUITY THROUGH STANDARDS AND COMPLIANCE
2 September 2021
Articles
Critical Information Infrastructure (CII) information systems and networks ...
Read More
Crypto-Ransomware Behaviour On Infected Machine
2 September 2021
Articles
Crypto-ransomware is a type of malware that encrypts the files of a user. T...
Read More
Data Sanitization - Definition, Importance, Methods And Advantages
2 September 2021
Articles
For many years, oil has been one of the main and arguably the most valuable...
Read More
Achieving 5G Security through Open Standards
2 September 2021
Articles
In telecommunications, 5G is the fifth generation technology standard for b...
Read More
Overview of Prioritization Model for National Critical Sectors Protection
2 September 2021
Articles
The national critical sectors are an important sector that should be paramo...
Read More
Global ACE Certification
2 September 2021
Articles
Organizations are expected to keep their customers’ data safe and secure, b...
Read More
Implementation Of Cyber Range For Cyber Defence Strategy
2 September 2021
Articles
Cyber defense comprises activities that measure the effectiveness of mitiga...
Read More
The Integration of Cyber Warfare and Information Warfare. Part 01
2 September 2021
Articles
Throughout the years, the appearance of cyber warfare and information warfa...
Read More
1
2