MakeUseOf

Chris Odogwu-Staff Writer for Security

Chris Odogwu

Staff Writer for Security

About Chris Odogwu

Chris Odogwu is a writer and digital creator. With more than a decade of experience writing professionally, he’s versatile across several niches including cybersecurity, software as a service (SaaS), and digital marketing. 

Chris has built a successful writing career working remotely with reputable organizations. He holds a master's degree in mass communications with a concentration in public relations and advertising from the University of Lagos and a bachelor’s degree in mass communications from the University of Jos. He loves to read, dance and watch interesting movies. 

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Fitbit linked to an iphone 1
What Are IoT Botnet Attacks and How Can You Prevent Them?

Internet of Things devices need proper security measures in place too. Here's why hackers attack IoT tech and what you can do about it.

Man wearing a VR headset 1
Is Immersive Technology a Gain or Loss for Cybersecurity?

Virtual reality, augmented reality, and haptics have lots of benefits, but are those outweighed by their downsides in terms of security?

Woman writing on the table in front of a laptop  1
What Is Threat Modeling and Why Do You Need It?

Don't just wait around for cyber attacks to happen. Have a plan of action!

Worried man outside 1
What Is Credential Theft and How Can You Prevent It?

Most thieves are after money, and your personal information can help them get what they want.

Man entering credit card details on smartphone  1
What Are Identity-Based Attacks and How Can You Prevent Them?

You share details about your identity whenever you create accounts online. How can you protect this information?

Man operating a computer system 1
What Are Security Automation Systems and Why Do You Need Them?

Have a computer keep a watchful eye over aspects of your cybersecurity so that you don't have to.

Woman drinking coffee while staring at a laptop screen 1
What Is Penetration Testing as a Service (PTaaS) and Do You Need It?

You can attempt to perform your own penetration tests, or you can outsource that job to someone else.

digital-risk 1
What Is Digital Risk Protection and Why Do You Need It?

When you store any information digitally, that data is at risk. How can you minimize your vulnerabilities?

Woman seated on a couch working on a laptop  1
What Is the Certified Ethical Hacker (CEH) Certification and Who Needs It?

These credentials let people know that you have the necessary skills and that you're working to fight crime, not commit it.

Man working on a laptop 1
Should You Outsource Your Network Security? Here Are the Pros and Cons

You may have enough knowledge to manage cybersecurity yourself, but it might be best to leave it to the pros.

Lady working on a laptop 1
What Is an ARP Poisoning Attack and How Can You Prevent It?

There are many ways to gain access to a system. ARP poisoning targets a way our devices communicate with one another.

Man working on a computer in the office  1
10 Common Myths About Penetration Testing Debunked

Penetration testing is a key way to keep your information secure, but many of us make quite a few false assumptions about it.

Woman working on laptop at home 1
What Is SASE Security and Why Do You Need It?

SASE saves you the time and effort of having to implement many separate security solutions one at a time.

amazon web services logo on top of containers 1
How to Secure Your Data With AWS Container Security

AWS container security can help protect your data and provide other efficient services at the same time.

Sad woman staring at a laptop  1
What Is a Multi-Vector Attack and How Can You Prevent It?

Learn about the ins and outs of multi-vector attacks and discover effective ways to safeguard against them.

man-typing-system 1
What Is Extended Detection and Response (XDR) and Why Do You Need It?

With this framework, you can gain the foresight to identify vulnerabilities that you might otherwise overlook.

Man working on a laptop 1
5 Threat Hunting Misconceptions You Need to Ditch Immediately

Make sure you do not fall prey to these misconceptions while threat hunting.

Woman surprised on computer 1
What Is Application Security and Why Do You Need It?

Application security can secure your data and protect it from external threats like hackers.

Laptop on a desk 1
What Are Eavesdropping Attacks and How Can You Prevent Them?

Hackers might be secretly stealing your data. Learn what eavesdropping is and take the suggested measures to protect yourself.

Smiling Woman on Work Desk 1
10 Cybersecurity Career Options and What They Offer You

If you’re looking to pursue a career in cybersecurity, this guide presents you with the options you may consider.

1 2 3 4 5
Page 1 / 11