Jeremiah Peter

Jeremiah Osigbemhe Peter is a trailblazer in the realm of Cybersecurity Engineering, holding the positions of Founder and Director of Information Security at Presence Secure. Hailing from Nigeria, he's renowned as a distinguished African leader, renowned for his collaboration with prestigious international NGOs, including the esteemed CSAAE (Center for Social Awareness, Advocacy, and Ethics). Jeremiah's passion for cybersecurity extends beyond his professional realm; he educates the public through engaging radio programs, enhancing awareness across communities. Jeremiah embarked on his professional journey as a Network Engineer at Galaxy Backbone Limited, establishing himself as a registered engineer recognized by the Council for the Regulation of Engineering in Nigeria. His academic prowess includes an MBA with specialization in Cybersecurity from Nexford University, further solidifying his expertise. Moreover, Jeremiah's corporate memberships in the Nigerian Society of Engineers (MNSE) and the Nigerian Institute of Electrical & Electronic Engineers (MNIEEE) underscore his commitment to Information and Communications Technology Engineering and Project Management. He actively contributes to various initiatives, driving innovation and progress in the field. Beyond his role at Presence Secure, Jeremiah assumes pivotal positions as the Head of ICT and ICT Consultant for government and private entities in Nigeria. His dedication to advancing Nigerian institutions is evident through his provision of invaluable Institutional and Organizational Technical Assistance. Notably, Jeremiah played a significant role in the success of the National Identity Number (NIN) initiative led by the National Identity Management Commission (NIMC), demonstrating his technical prowess and strategic acumen. Jeremiah's passion for cybersecurity transcends professional boundaries; he's an avid researcher and writer, constantly expanding his knowledge in the realm of information security. Outside of work, he finds joy in exploring new destinations, immersing himself in diverse cultures, and embracing the wonders of the natural world through hiking and wildlife observation. However, Jeremiah's greatest joy comes from spending quality time with his family, cherishing moments filled with laughter, love, and meaningful connections.

Humanoid Robots: Bridging the Gap Between Machines and Humans

Humanoid Robots: Bridging the Gap Between Machines and Humans

The possibilities for humanoid robots are endless. In the future, they could assist in disaster response, navigating dangerous environments to rescue people. They would become more integrated into the lives of people, helping with household chores or providing care for loved ones.
One exciting area of research is brain-computer interfaces, which could allow humans to control robots with their thoughts. Imagine a person with mobility challenges using a humanoid robot to regain independence—it’s a future that’s not too far away.

Humanoid Robots: Bridging the Gap Between Machines and Humans Read More »

Breaking Down Nigeria's Cybercrimes Act 2024 Who Pays the 0.5% Cybersecurity Levy

Breaking Down Nigeria’s Cybercrimes Act 2024: Who Pays the 0.5% Cybersecurity Levy?

In today’s interconnected world, cybersecurity is no longer just a concern for governments and businesses—it’s a responsibility shared by individuals, corporations, and governments alike. This underscores the necessity of the Cybercrime (Prohibition, Prevention, etc.) (Amendment) Act 2024.

Breaking Down Nigeria’s Cybercrimes Act 2024: Who Pays the 0.5% Cybersecurity Levy? Read More »

Cybersecurity for Small Businesses_Protecting Your Company from Digital Threats

Cybersecurity for Small Businesses: Protecting Your Company from Digital Threats

Running a small business is no easy feat. Entrepreneurs find themselves switching between different roles to ensure their businesses scale. While there are many aspects to focus on like marketing, customer experience, accounting, and product development, many small businesses tend to overlook one major aspect – Cybersecurity. It’s bonkers to think that your small business

Cybersecurity for Small Businesses: Protecting Your Company from Digital Threats Read More »

Building a Cyber-Resilient Organization Strategies for Effective Incident Response

Building a Cyber-Resilient Organization: Strategies for Effective Incident Response

In today’s interconnected digital landscape, strategies necessary for organizations to develop an effective incident response plan and thereby enhance their overall cyber resilience is topmost. The threat of cyberattacks looms larger than ever before, organizations of all sizes and industries are constantly at risk of falling victim to malicious cyber activities that can cause significant

Building a Cyber-Resilient Organization: Strategies for Effective Incident Response Read More »

SELF-DRIVING VEHICLES IN THE ERA OF CYBERSECURITY

Self-Driving Vehicles in the Era of Cybersecurity

Like social media connecting people, self-driving vehicles seek to connect cars using real-time data from multiple resources with smartphone operating system and telecommunication network operating standards to make decisions for smooth driving on the road. While this technology has the potential to revolutionize transportation and improve road safety, it also poses significant cybersecurity challenges, therefore

Self-Driving Vehicles in the Era of Cybersecurity Read More »

The Advantages and Limitations of Artificial Intelligence and Machine Learning in Cybersecurity

The Advantages and Limitations of Artificial Intelligence and Machine Learning in Cybersecurity

Given the current challenges, artificial intelligence (AI) and machine learning (ML) offer the greatest potential for improving cybersecurity and safety. Have you ever wondered how companies keep your personal information safe from cybercriminals? With technology constantly evolving, it’s becoming increasingly difficult to protect sensitive information from cyber-attacks. AI and ML can help identify potential threats

The Advantages and Limitations of Artificial Intelligence and Machine Learning in Cybersecurity Read More »

Cybersecurity Implications for the Electoral Amendment Bill and 2023 General Elections in Nigeria

Cybersecurity Implications for the Electoral Amendment Bill and 2023 General Elections in Nigeria

The election period is not always pretty to all, whether for the presidential election, gubernatorial election, senatorial election, or even the local government representative election. Election challenges range from hired thugs who move from one polling unit to the other snatching ballot boxes, to fake ballot papers, and of course, fake votes, and then to violent

Cybersecurity Implications for the Electoral Amendment Bill and 2023 General Elections in Nigeria Read More »

Women-Led Small Businesses are more exposed to Cyber Attacks

Women-Led Small Businesses are more exposed to Cyber Attacks

Small businesses are sometimes called Small-scale enterprises or small firms, which may be defined as businesses with less than 100 employees. However, are small businesses really defined by the number of their employees? In Nigeria, according to Finance Law (2020), a small business is one with a turnover that is less than NGN25 million annually,

Women-Led Small Businesses are more exposed to Cyber Attacks Read More »

metaverse

THE METAVERSE: The future digital economy of new possibilities and threats

The human desire to advance and break new barriers is unsearchable, which affects the way we live now and in the future. The metaverse is the future of the Internet, an Internet with almost the five senses. The technology is still at its infant stage, with lots of research ongoing and so many pieces unknown.

THE METAVERSE: The future digital economy of new possibilities and threats Read More »

Scroll to Top