{"id":2,"date":"2020-11-04T12:27:37","date_gmt":"2020-11-04T12:27:37","guid":{"rendered":"http:\/\/africacybersecure.org\/?page_id=2"},"modified":"2025-07-17T17:29:42","modified_gmt":"2025-07-17T15:29:42","slug":"sample-page","status":"publish","type":"page","link":"https:\/\/africacybersecure.org\/","title":{"rendered":"Home"},"content":{"rendered":"<div id=\"pl-2\"  class=\"panel-layout\" ><div id=\"pg-2-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-2-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-2-0-0-0\" class=\"widget_text so-panel widget widget_custom_html panel-first-child panel-last-child\" data-index=\"0\" ><h3 class=\"widget-title\">News<\/h3><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-grid pt-cv-colsys\" id=\"pt-cv-view-f4dc869ovx\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"3\"><div class=\"col-md-4 col-sm-4 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/africacybersecure.org\/?p=704\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" src=\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-3-300x225.jpg\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-3-300x225.jpg 300w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-3-1024x768.jpg 1024w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-3-768x576.jpg 768w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-3-1536x1152.jpg 1536w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-3-2048x1536.jpg 2048w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2025\/07\/2025_02_24_ACC_ULK_Photo-3-400x300.jpg 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n<h3 class=\"pt-cv-title\"><a href=\"https:\/\/africacybersecure.org\/?p=704\" class=\"_self\" target=\"_self\" >Introducing ULK students to ACC&#8217;s portfolio of products and services<\/a><\/h3>\n<div class=\"pt-cv-content\">On 24th February 2025, Africa Cybersecurity Consortium (ACC) had the opportunity to introduce its portfolio of products and services to ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/africacybersecure.org\/?p=704\" class=\"_self pt-cv-readmore btn btn-success\" target=\"_self\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-4 col-sm-4 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/africacybersecure.org\/?p=106\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"131\" src=\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/Hilary-Muramira-2x1point5inch-e1552764438529-1024x448-1-300x131.jpg\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/Hilary-Muramira-2x1point5inch-e1552764438529-1024x448-1-300x131.jpg 300w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/Hilary-Muramira-2x1point5inch-e1552764438529-1024x448-1-768x336.jpg 768w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/Hilary-Muramira-2x1point5inch-e1552764438529-1024x448-1.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n<h3 class=\"pt-cv-title\"><a href=\"https:\/\/africacybersecure.org\/?p=106\" class=\"_self\" target=\"_self\" >Mr. Hilary MURAMIRA Became the 3rd in the Meeting of the Minds 2019 awards<\/a><\/h3>\n<div class=\"pt-cv-content\">Africa Cybersecurity Consortium\u00a0 gave congratulations to Mr. Hilary MURAMIRA, one of the co-founders of who presented his paper \u201cApplying blockchain ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/africacybersecure.org\/?p=106\" class=\"_self pt-cv-readmore btn btn-success\" target=\"_self\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-4 col-sm-4 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/africacybersecure.org\/?p=103\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/DSC_57672x1inch-1024x512-1-300x150.jpg\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/DSC_57672x1inch-1024x512-1-300x150.jpg 300w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/DSC_57672x1inch-1024x512-1-768x384.jpg 768w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/DSC_57672x1inch-1024x512-1.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n<h3 class=\"pt-cv-title\"><a href=\"https:\/\/africacybersecure.org\/?p=103\" class=\"_self\" target=\"_self\" >Cybersecurity Awareness at University of Rwanda, Nyarugenge Campus, BICT<\/a><\/h3>\n<div class=\"pt-cv-content\">Cybersecurity awareness at UR, College of Science and Technology, BICT, was the third event of the awareness after the one ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/africacybersecure.org\/?p=103\" class=\"_self pt-cv-readmore btn btn-success\" target=\"_self\">Read More<\/a><\/div><\/div><\/div><\/div>\n<div class=\"col-md-4 col-sm-4 col-xs-12 pt-cv-content-item pt-cv-1-col\" ><div class='pt-cv-ifield'><a href=\"https:\/\/africacybersecure.org\/?p=100\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/b82x1inch-1024x512-1-300x150.jpg\" class=\"pt-cv-thumbnail\" alt=\"\" srcset=\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/b82x1inch-1024x512-1-300x150.jpg 300w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/b82x1inch-1024x512-1-768x384.jpg 768w, https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/b82x1inch-1024x512-1.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>\n<h3 class=\"pt-cv-title\"><a href=\"https:\/\/africacybersecure.org\/?p=100\" class=\"_self\" target=\"_self\" >Cybersecurity Awareness at Adventist Central Africa University (AUCA)<\/a><\/h3>\n<div class=\"pt-cv-content\">Cybersecurity awareness at AUCA is the second event of the awareness after the one carried out at Carnegie Mellon University ...<br \/><div class=\"pt-cv-rmwrap\"><a href=\"https:\/\/africacybersecure.org\/?p=100\" class=\"_self pt-cv-readmore btn btn-success\" target=\"_self\">Read More<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>News Introducing ULK students to ACC&#8217;s portfolio of products and services On 24th February 2025, Africa Cybersecurity Consortium (ACC) had the opportunity to introduce its portfolio of products and services to &#8230;Read More Mr. Hilary MURAMIRA Became the 3rd in the Meeting of the Minds 2019 awards Africa Cybersecurity Consortium\u00a0 gave congratulations to Mr. Hilary [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":39,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Home - Africa Cybersecurity Consortium<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/africacybersecure.org\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Home - Africa Cybersecurity Consortium\" \/>\n<meta property=\"og:description\" content=\"News Introducing ULK students to ACC&#8217;s portfolio of products and services On 24th February 2025, Africa Cybersecurity Consortium (ACC) had the opportunity to introduce its portfolio of products and services to ...Read More Mr. Hilary MURAMIRA Became the 3rd in the Meeting of the Minds 2019 awards Africa Cybersecurity Consortium\u00a0 gave congratulations to Mr. Hilary [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/africacybersecure.org\/\" \/>\n<meta property=\"og:site_name\" content=\"Africa Cybersecurity Consortium\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-17T15:29:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/01\/b22.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/africacybersecure.org\/\",\"url\":\"https:\/\/africacybersecure.org\/\",\"name\":\"Home - Africa Cybersecurity Consortium\",\"isPartOf\":{\"@id\":\"https:\/\/africacybersecure.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/africacybersecure.org\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/africacybersecure.org\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/01\/b22.jpg\",\"datePublished\":\"2020-11-04T12:27:37+00:00\",\"dateModified\":\"2025-07-17T15:29:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/africacybersecure.org\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/africacybersecure.org\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/africacybersecure.org\/#primaryimage\",\"url\":\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/01\/b22.jpg\",\"contentUrl\":\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/01\/b22.jpg\",\"width\":1800,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/africacybersecure.org\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/africacybersecure.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/africacybersecure.org\/#website\",\"url\":\"https:\/\/africacybersecure.org\/\",\"name\":\"Africa Cybersecurity Consortium\",\"description\":\"It is about secure cyber\",\"publisher\":{\"@id\":\"https:\/\/africacybersecure.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/africacybersecure.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/africacybersecure.org\/#organization\",\"name\":\"Africa Cybersecurity Consortium\",\"url\":\"https:\/\/africacybersecure.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/africacybersecure.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/cropped-ACC_Banner_PadWithSkyWhiteBlackColor_TransparentBG.png\",\"contentUrl\":\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/cropped-ACC_Banner_PadWithSkyWhiteBlackColor_TransparentBG.png\",\"width\":250,\"height\":62,\"caption\":\"Africa Cybersecurity Consortium\"},\"image\":{\"@id\":\"https:\/\/africacybersecure.org\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Home - Africa Cybersecurity Consortium","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/africacybersecure.org\/","og_locale":"en_US","og_type":"article","og_title":"Home - Africa Cybersecurity Consortium","og_description":"News Introducing ULK students to ACC&#8217;s portfolio of products and services On 24th February 2025, Africa Cybersecurity Consortium (ACC) had the opportunity to introduce its portfolio of products and services to ...Read More Mr. Hilary MURAMIRA Became the 3rd in the Meeting of the Minds 2019 awards Africa Cybersecurity Consortium\u00a0 gave congratulations to Mr. Hilary [&hellip;]","og_url":"https:\/\/africacybersecure.org\/","og_site_name":"Africa Cybersecurity Consortium","article_modified_time":"2025-07-17T15:29:42+00:00","og_image":[{"width":1800,"height":1200,"url":"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/01\/b22.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/africacybersecure.org\/","url":"https:\/\/africacybersecure.org\/","name":"Home - Africa Cybersecurity Consortium","isPartOf":{"@id":"https:\/\/africacybersecure.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/africacybersecure.org\/#primaryimage"},"image":{"@id":"https:\/\/africacybersecure.org\/#primaryimage"},"thumbnailUrl":"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/01\/b22.jpg","datePublished":"2020-11-04T12:27:37+00:00","dateModified":"2025-07-17T15:29:42+00:00","breadcrumb":{"@id":"https:\/\/africacybersecure.org\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/africacybersecure.org\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/africacybersecure.org\/#primaryimage","url":"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/01\/b22.jpg","contentUrl":"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/01\/b22.jpg","width":1800,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/africacybersecure.org\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/africacybersecure.org\/"},{"@type":"ListItem","position":2,"name":"Home"}]},{"@type":"WebSite","@id":"https:\/\/africacybersecure.org\/#website","url":"https:\/\/africacybersecure.org\/","name":"Africa Cybersecurity Consortium","description":"It is about secure cyber","publisher":{"@id":"https:\/\/africacybersecure.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/africacybersecure.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/africacybersecure.org\/#organization","name":"Africa Cybersecurity Consortium","url":"https:\/\/africacybersecure.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/africacybersecure.org\/#\/schema\/logo\/image\/","url":"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/cropped-ACC_Banner_PadWithSkyWhiteBlackColor_TransparentBG.png","contentUrl":"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/cropped-ACC_Banner_PadWithSkyWhiteBlackColor_TransparentBG.png","width":250,"height":62,"caption":"Africa Cybersecurity Consortium"},"image":{"@id":"https:\/\/africacybersecure.org\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2"}],"version-history":[{"count":17,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":692,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/pages\/2\/revisions\/692"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/media\/39"}],"wp:attachment":[{"href":"https:\/\/africacybersecure.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}