Information Technology & Cybersecurity Training and Consulting

  • Follow
  • Follow
  • Follow
  • Follow
  • Follow
Menu
  • Home
  • About
  • Trainings
  • Services
  • Cybersecurity
    • Close
    • Cybersecurity Framework 2.0
    • Cybersecurity Framework 1.1
    • Cybersecurity Technical Architecture Reference
    • Risk Management Framework
    • COBIT 2019 – Governance and Management Objectives
    • OWASP Top 10 (2021) Threat Levels
    • Amazon Web Services (AWS) Security
    • Azure Cloud Security
    • Azure Cloud Security Benchmark
    • Ransomware Prevention Guide
    • Identity Management Security
    • ISO 27001:2022 – Security Controls
    • PCI DSS Requirements
    • Zero Trust Security
    • Data Privacy Framework
    • DevSecOps Lifecycle Security Reference
    • Ethical Guidelines for Trustworthy Artificial Intelligence (AI)
    • Close
  • IT Job Roles
  • KB
  • Blog
  • Contact
  • All
  • Infographics
  • Charts
  • Technology
  • Information Security
  • Jobs
  • AI
  • General
  • Health
30 Major Technology Acquisitions in 2018

30 Major Technology Acquisitions in 2018

27 Dec 2018 | Technology
Tips To Stay Safe Online This Holiday

Tips To Stay Safe Online This Holiday

25 Dec 2018 | Information Security
Best Inventions and Innovations of 2018

Best Inventions and Innovations of 2018

23 Dec 2018 | Technology
How To Detect Phishing Scams in Emails

How To Detect Phishing Scams in Emails

20 Dec 2018 | Information Security
Cyber Threats Infographic: Evolution and Prevention

Cyber Threats Infographic: Evolution and Prevention

17 Dec 2018 | Infographics
Global Google Search Trends In 2018

Global Google Search Trends In 2018

15 Dec 2018 | Technology
20 Most Popular Social Networks of 2018

20 Most Popular Social Networks of 2018

14 Dec 2018 | Charts
A Beginners Guide to Information Security Awareness – Part 1

A Beginners Guide to Information Security Awareness – Part 1

1 Dec 2018 | Information Security
A Beginners Guide to Information Security Awareness – Part 2

A Beginners Guide to Information Security Awareness – Part 2

1 Dec 2018 | Information Security
A Beginners Guide to Information Security Awareness – Part 3

A Beginners Guide to Information Security Awareness – Part 3

1 Dec 2018 | Information Security
A Beginners Guide to Information Security Awareness – Part 4

A Beginners Guide to Information Security Awareness – Part 4

1 Dec 2018 | Information Security
A Beginners Guide to Information Security Awareness – Part 5

A Beginners Guide to Information Security Awareness – Part 5

1 Dec 2018 | Information Security
  • 4
  • 1
  • 2
  • 5

Euriun Technologies is an Information Technology and Cybersecurity Management Services Company providing managed support services on Windows and Linux Servers, Vulnerability Management, Information Security Audit, Web Application Security, Business Intelligence and Data Analytics, Project and Service Management and Business Process Automation/Workflow.

Suite D98 Dolphin Plaza,
Ikoyi, Lagos, Nigeria.

[email protected]

+234 0201 4536171

Euriun Technologies
  • Follow
  • Follow
  • Follow
  • Follow
  • Follow
Copyright © 2025 | Euriun Technologies Limited | All Rights Reserved.
  • +234 0201 453 6171

  • [email protected]