top of page
Newsletter
Stay informed with the International Association of Cybersecurity and AI Professionals (IACAP) Newsletter, delivering the latest updates on cybersecurity, artificial intelligence, threat intelligence, AI governance, and industry trends for cybersecurity and AI professionals worldwide.


The Cybersecurity Risks of Cardiac Devices
The Possibility of Heart Pacemaker Cyber Exploit and Compromises

Dr. Lucky Ogoo
Dec 12, 20254 min read


The Cyber Risks of AI Christmas Toys
The Cyber Risks of AI Christmas Toys

Dr. Lucky Ogoo
Dec 12, 20254 min read


Juice Jacking: Understanding and Mitigating the Cyber Threat in Public USB Charging
Understanding and Mitigating the Cyber Threat in Public USB Charging. As mobile devices have become indispensable, the need for on-the-go charging has grown. Public USB charging stations found in airports, hotels, shopping malls, cafés, and transportation hubs offer convenience but also introduce a growing cybersecurity risk: juice jacking. Juice jacking is an attack where threat actors exploit USB ports or cables to deliver malware, steal data, or compromise devices during c

Dr. Lucky Ogoo
Nov 27, 20254 min read


Strategies to Defend Against the Growing Risk of Ransomware
Executive Summary Ransomware has become one of the most significant and rapidly evolving cyber threats worldwide. As attacks grow more targeted, sophisticated, and destructive, organizations must adopt comprehensive, layered strategies to defend against operational disruption, data loss, financial impact, and reputational harm. This white paper examines the modern ransomware landscape, identifies key vulnerabilities, and presents actionable strategies to strengthen resilience

Dr. Emily Holliday
Nov 25, 20253 min read


Protect, Secure and Prevent
Secure Your Mobile Device Securing your mobile device is the first step to protecting your personal information. Always use strong passwords, enable biometric authentication, and keep your software updated to defend against vulnerabilities. Regularly backing up your data ensures that you do not lose important files in case of theft, loss, or a cyber-attack. Use cloud services or external hard drives for effective backup solutions. Use a VPN and Anti-Virus Software Using a VPN

Dr. Emily Holliday
Nov 16, 20252 min read


How Secure Is Open Wi-Fi? Can Our Communication Be Intercepted?
Understanding Open Wi-Fi Security Open Wi-Fi networks are widely available in public places such as cafes, airports, and libraries. While convenient, they come with significant security risks. Risks of Using Open Wi-Fi 1. **Data Interception**: Without encryption, any data transmitted over an open Wi-Fi network can be intercepted by malicious actors. This includes sensitive information such as passwords, emails, and personal messages. 2. **Man-in-the-Middle Attacks**: Attac

Casieblue Group Limited
Nov 15, 20251 min read


The Hidden Mole: Cybercriminal Operating Inside the Organisation
In today's digital age, the threat of cybercrime is ever-present, and one of the most insidious forms of this threat comes from within an organisation. This internal threat, often referred to as "the hidden mole," can have devastating effects on a company's security, reputation, and bottom line. Understanding the Hidden Mole A hidden mole is typically an employee or contractor who exploits their access to sensitive information for malicious purposes. This can include data the

Dr. Lucky Ogoo
Nov 15, 20252 min read


Privacy-Preserving AI in Healthcare Cybersecurity
Privacy-preserving AI in healthcare cybersecurity is a critical area of focus as the healthcare sector increasingly relies on data-driven technologies. Ensuring the security and privacy of sensitive patient information while leveraging AI capabilities is paramount. Artificial Intelligence (AI) has emerged as a transformative force within the healthcare sector, offering unprecedented advancements in clinical diagnostics, predictive analytics, and personalised medicine. The abi

Dr. Lucky Ogoo
Nov 14, 20252 min read
bottom of page
