{"id":53240,"date":"2023-08-15T17:00:00","date_gmt":"2023-08-15T17:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/dr-global\/bolstering-africa-cybersecurity"},"modified":"2023-08-15T17:00:00","modified_gmt":"2023-08-15T17:00:00","slug":"bolstering-africas-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/bolstering-africas-cybersecurity\/","title":{"rendered":"Bolstering Africa\u2019s Cybersecurity"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbd9c496a3e329ec0\/64d2c2e451d6a941c31b439f\/blue_africa_globe_Jimmie_Tolliver_Alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>According to <a href=\"https:\/\/liquid.tech\/wp-content\/uploads\/2023\/06\/LIQUID-C2-Report.pdf\" target=\"_blank\" rel=\"noopener\">recent data<\/a>, African nations faced a <a href=\"https:\/\/www.darkreading.com\/dr-global\/african-nations-escalating-phishing-compromised-password-cyberattacks\" target=\"_blank\" rel=\"noopener\">significantly larger number<\/a> of cyberattacks in 2022 than in years past. For example, businesses in Kenya reported an 82% increase in such attacks, while those in South Africa and Zambia each <a href=\"https:\/\/allafrica.com\/stories\/202306300233.html\" target=\"_blank\" rel=\"noopener\">reported<\/a> 62% increases.<\/p>\n<p>It&#8217;s odd that there should be such a rise in the level of attacks. Is it because attackers were specifically targeting consumers in those nations, or is there another explanation?&nbsp;<\/p>\n<p>We must take into account the important socioeconomic factors at work. For instance, in 2022, <a href=\"https:\/\/reliefweb.int\/report\/world\/joining-forces-africa-policy-brief-there-no-reason-food-insecurity-21st-century\" target=\"_blank\" rel=\"noopener\">it was estimated<\/a> that approximately 282 million people were undernourished, and 113 million people across 15 African countries required urgent humanitarian assistance.<\/p>\n<p>A thriving economy needs several factors to continue an upward trajectory, among them public spending, business investment, and deregulation of businesses. But is Africa in a position to enable these factors to take place? Is the continent too fractured to be able to uphold a cybersecurity defense against attacks?<\/p>\n<p>It is clear that there is enough population in some areas, but do the opportunities to learn and gain employment exist?<\/p>\n<h2 class=\"regular-text\">Growth in the Future<\/h2>\n<p>Financial analysts still believe the continent has enormous growth potential, due to its youthful population \u2014 <a href=\"https:\/\/www.worldometers.info\/world-population\/africa-population\/\" target=\"_blank\" rel=\"noopener\">the median age of whom is estimated to be 18.8 years<\/a> \u2014 who are eager for gainful employment, social interaction, and greater global connectivity.<\/p>\n<p>While we may be pleased to discover this population has more access to information through digital means, it&#8217;s apparent that not enough cybersecurity education has been made widely available.&nbsp;<\/p>\n<p>In recent weeks and months, we have seen opportunities arise, often provided by academia and government, to improve cyber education. However, some parts of Africa are still without decent levels of electricity. So, is the dream of cyber education for all unattainable?<\/p>\n<p>According to a <a href=\"https:\/\/liquid.tech\/about-us\/news\/liquid-c2-cyber-security-report\/\" target=\"_blank\" rel=\"noopener\">Liquid C2 survey<\/a>, Africa is facing a serious shortage of 100,000 qualified cybersecurity specialists, despite the fact that 68% of respondents said they had either hired cybersecurity employees or worked with a cybersecurity team in the preceding year. Only 7,000 qualified cybersecurity experts are thought to exist: This equates to one for every 177,000 people in Africa.&nbsp;<\/p>\n<p>Despite this, Africa-based data security analysts point out that a dearth of qualified technicians coupled with a lack of investment in cybersecurity has been the direct contributor to a growth in the amount and scale of successful cyberattacks. In fact, according to <a href=\"https:\/\/pressroom.ifc.org\/all\/pages\/PressDetail.aspx?ID=26066\" target=\"_blank\" rel=\"noopener\">research from IFC and Google<\/a>, Africa\u2019s e-economy is expected to reach $180 billion by 2025, but its lack of security support could halt that growth.&nbsp;<\/p>\n<p>Most of these campaigns are based upon spam or phishing efforts derived from information garnered from open source intelligence (OSINT), which is often more effective against a remote workforce that may be more exposed to attack techniques while outside of the technical and administrative controls of traditional office work. As we have stated many times publicly, the human being is one of the most exploited threat vectors in the world.<\/p>\n<h2 class=\"regular-text\">Recognizing the Threats<\/h2>\n<p>Cybercriminals are increasingly targeting African countries, highlighting the critical need for strong defense and all-encompassing cybersecurity regulations. While it is evident these countries face significant cybersecurity challenges, there is a positive trend toward the rapid introduction of measures to counter these threats.&nbsp;<\/p>\n<p>Recognizing that African nations are under constant cyberattack allows the cybersecurity industry to better understand and address their unique vulnerabilities. By offering tailored support and solutions, the industry can play a pivotal role in bolstering the defenses of African countries and safeguarding their growing digital economies.<\/p>\n<p>Collaboration and knowledge sharing between stakeholders will be crucial in building a resilient cybersecurity ecosystem to effectively protect these nations from evolving cyber threats.<\/p>\n<h2 class=\"regular-text\">Need for More Protocols as Well as Staff<\/h2>\n<p>The rapid growth of e-commerce in Africa underscores the critical need for robust cybersecurity measures. However, it is concerning that <a href=\"https:\/\/www.interpol.int\/en\/News-and-Events\/News\/2021\/INTERPOL-report-identifies-top-cyberthreats-in-Africa\" target=\"_blank\" rel=\"noopener\">Interpol reports<\/a> that more than 90% of businesses on the continent operate without essential cybersecurity protocols. This gap exposes the vulnerability of African businesses to cyberattacks, resulting in <a href=\"https:\/\/www.interpol.int\/en\/News-and-Events\/News\/2021\/INTERPOL-report-identifies-top-cyberthreats-in-Africa#:~:text=Cybercrimes%20affect%20all%20countries%2C%20but,leaving%20huge%20potential%20for%20growth.\" target=\"_blank\" rel=\"noopener\">significant financial losses of over $4 billion annually<\/a>.<\/p>\n<p>Successful cybersecurity often relies upon a financially viable scenario, as with support and financial investment, a cybersecurity strategy becomes more realistic. Africa, as an emerging continent, is witnessing rapid technological advancements, necessitating the need to keep pace with this evolving landscape. Ensuring secure ecommerce platforms is imperative to protect businesses and customers from the detrimental impact of cyber threats.<\/p>\n<p>As organizations seek cybersecurity and managed security service providers to fill the talent gap, those providers can find themselves quickly overwhelmed by volumetric factors \u2014 such as an increase in demand for assistance and an increase in attacks \u2014 driving the need for increased security. It&#8217;s necessary these efforts be accompanied by meaningful public policy, regulatory frameworks, and cybersecurity awareness initiatives.<\/p>\n<p>Also, the increasing spend for cybersecurity providers is often outmatched by the costs of not being secure, and the financial tipping point between investment in cybersecurity and the cost of being compromised and recovery has not been achieved.&nbsp;<\/p>\n<p>Increasing cybersecurity and reducing both incentives for and effectiveness of attackers is a long game that will require a multiyear commitment from government, businesses, and individuals.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/dr-global\/bolstering-africa-cybersecurity\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A thriving economy needs several factors to continue an upward trajectory \u2014 but is Africa in a position to enable these factors to take place?Read More <a href=\"https:\/\/www.darkreading.com\/dr-global\/bolstering-africa-cybersecurity\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-53240","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bolstering Africa\u2019s Cybersecurity 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/bolstering-africas-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bolstering Africa\u2019s Cybersecurity 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/bolstering-africas-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-15T17:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbd9c496a3e329ec0\/64d2c2e451d6a941c31b439f\/blue_africa_globe_Jimmie_Tolliver_Alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bolstering-africas-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bolstering-africas-cybersecurity\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Bolstering Africa\u2019s Cybersecurity\",\"datePublished\":\"2023-08-15T17:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bolstering-africas-cybersecurity\\\/\"},\"wordCount\":851,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bolstering-africas-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltbd9c496a3e329ec0\\\/64d2c2e451d6a941c31b439f\\\/blue_africa_globe_Jimmie_Tolliver_Alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bolstering-africas-cybersecurity\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bolstering-africas-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bolstering-africas-cybersecurity\\\/\",\"name\":\"Bolstering Africa\u2019s Cybersecurity 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bolstering-africas-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bolstering-africas-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltbd9c496a3e329ec0\\\/64d2c2e451d6a941c31b439f\\\/blue_africa_globe_Jimmie_Tolliver_Alamy.jpg\",\"datePublished\":\"2023-08-15T17:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bolstering-africas-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bolstering-africas-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bolstering-africas-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltbd9c496a3e329ec0\\\/64d2c2e451d6a941c31b439f\\\/blue_africa_globe_Jimmie_Tolliver_Alamy.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltbd9c496a3e329ec0\\\/64d2c2e451d6a941c31b439f\\\/blue_africa_globe_Jimmie_Tolliver_Alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bolstering-africas-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bolstering Africa\u2019s Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bolstering Africa\u2019s Cybersecurity 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/bolstering-africas-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Bolstering Africa\u2019s Cybersecurity 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/bolstering-africas-cybersecurity\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-08-15T17:00:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbd9c496a3e329ec0\/64d2c2e451d6a941c31b439f\/blue_africa_globe_Jimmie_Tolliver_Alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/bolstering-africas-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/bolstering-africas-cybersecurity\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Bolstering Africa\u2019s Cybersecurity","datePublished":"2023-08-15T17:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bolstering-africas-cybersecurity\/"},"wordCount":851,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bolstering-africas-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbd9c496a3e329ec0\/64d2c2e451d6a941c31b439f\/blue_africa_globe_Jimmie_Tolliver_Alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/bolstering-africas-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/bolstering-africas-cybersecurity\/","url":"https:\/\/www.threatshub.org\/blog\/bolstering-africas-cybersecurity\/","name":"Bolstering Africa\u2019s Cybersecurity 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bolstering-africas-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bolstering-africas-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbd9c496a3e329ec0\/64d2c2e451d6a941c31b439f\/blue_africa_globe_Jimmie_Tolliver_Alamy.jpg","datePublished":"2023-08-15T17:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/bolstering-africas-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/bolstering-africas-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/bolstering-africas-cybersecurity\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbd9c496a3e329ec0\/64d2c2e451d6a941c31b439f\/blue_africa_globe_Jimmie_Tolliver_Alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltbd9c496a3e329ec0\/64d2c2e451d6a941c31b439f\/blue_africa_globe_Jimmie_Tolliver_Alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/bolstering-africas-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Bolstering Africa\u2019s Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53240"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53240\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}