• Automotive Cybersecurity. An Introduction

    Introduction to Automotive Cybersecurity Cybersecurity is the practice of protecting digital assets from malicious attacks. It is also referred to as “information technology security” or “electronic information security.” The term is used in a variety of contexts, but in this article, we will be considering cybersecurity in the context of automobiles.  The automobile industry has…

    Continue Reading

  • Five (5) frameworks for improving cybersecurity

    A cybersecurity framework provides a set of baseline best practice criteria with a goal to further strengthen the cybersecurity posture of any organization where it is implemented. Having these frameworks in place, it becomes easy to define standard processes and procedures which sustains confidentiality, integrity and availability. In this article, we will talk about five…

    Continue Reading

  • Top 10 Cybersecurity Subreddits for Security Professionals

    Reddit is a social news website and forum where information is socially vetted and promoted by site members voting. The name of the website is a pun on the phrase “I read it.” Reddit is fragmented into over a million communities known as “subreddits,” each of which tackles a certain topic. A subreddit’s name begins…

    Continue Reading

  • Openid connect and oauth overview

    Over the past articles, we have been exploring the world of the middleman (Api). We have been sufficiently able to break the concept down describing what it is, the advantages it presents, how to make it secure and the tools used for assessing its security posture. In this article, we are going to explore two…

    Continue Reading

  • Computer Network Protocols: What it is and how it works

    Computer Network Protocols… What it is and how it works Network protocols is a word I’m sure you have heard in use among diverse technology professionals. In this article, I will try to explain what it is and some of the network protocols employed by information systems. Let’s start with Computer Networks. This simply put…

    Continue Reading

  • A Run Through Owasp Top 10:2021

    OWASP top 10 and how it works What is OWASP The Open Web Application Security Project (OWASP) is a non-profit foundation dedicated to improving the security of software. OWASP operates under an ‘open community model, this model enables anyone both to participate and contribute to projects, events, online chats, and more. All materials and information…

    Continue Reading

  • Nmap Cheatsheet X

    Network mapper (NMAP) is an opensource security tool used for network exploration, security scanning and auditing In this article, I will be listing some important Nmap commands that will make network assessment easy. Let’s go! Scan single Ipaddress: nmap ipaddress Scan a host: nmap server1.abc.xyz Scan a host with more information: nmap -v server1.abc.xyz Scan…

    Continue Reading

  • Social Engineering: The pervasive art of deception

    Social Engineering like the term suggests refers to a diverse range of activities employed by malicious parties with the aim of luring unsuspecting victims to divulge sensitive information which will impact their online safety and might lead to financial loss. This tactic has been increasingly employed by malicious parties in recent years, as it is…

    Continue Reading

  • Phishing Crossword

    I bet you’re wondering how to play this game……Don’t overthink it, I’ve explained below how to go about it. There are some empty boxes you’re expected to fill with words. The boxes are numbered in line with the clues listed below. Follow the clues to fill the boxes with the appropriate words, right words are…

    Continue Reading

  • Open Source Tools in Cybersecurity

    I have previously written on open source. Here is the link to that article, for more understanding. Today, I want to talk about open source tools. In this article I will discuss 10 open source tools that hackers and security researchers use to gather intelligence,before the real assessment or hacking is done.  First, what are…

    Continue Reading

  • Blockchain Oracles: What are they and how do they work?

    In the past few articles, I have written about blockchain, smart contract, smart contract audit and cryptojacking. I saw it fit to do a piece on blockchain oracles and we will be exploring this topic on the borders of: What are blockchain oracles? Blockchain Oracles Use case Types of oracles The oracle problem Blockchain oracles…

    Continue Reading

  • Auditing Smart Contract

    I did a piece on smart contract where I detailed the basics of the technology, how it works, platforms that drive smart contract and its diverse use case. The article can be found here: Smart Contract. In this article, we will further explore smart contracts by considering the security.  let us break down Auditing Smart…

    Continue Reading

  • Smart Contracts

    What are contracts ? What is a Smart Contract ? Smart Contract Platforms Sample Smart Contract code Smart Contract use case A contract is a legally binding document between at least two parties that defines and governs the rights and duties of the parties to an agreement.  The concept of contracts is so prevalent today,…

    Continue Reading

  • Things your boss wishes you knew about Information Technology Risk.

    Information technology is a new world entirely and it is so broad it is almost impossible to know all facets of it in depth. Information Technology is one of the branches of ICT

    Continue Reading

  • Top 5 cybersecurity experts you must follow in 2021

    Compiled in this piece in no particular order are the names of our top 5 cyber security experts you must follow if you are serious about cyber security in 2021.

    Continue Reading

  • An Introduction to Blockchain

    An Introduction to Blockchain What is Blockchain technology? History of Blockchain Breaking things down Benefits of blockchain What does all this mean? What is Blockchain Technology? Blockchain is a system that makes recording of information foolproof, such that it is difficult to alter or cheat the system. It employs the use of a decentralized digital…

    Continue Reading

  • The Biggest Problems With Information Technology Audit, And How You Can Fix It

    As technology and innovation maintains an upward thrust in our constantly evolving world of today, Information technology has rapidly become a very vital part of the growth of businesses at different scales and by extension the economy. The activities of Information technology is synonymous to that shiny Ferrarri f8 tributo that goes from 0 –100…

    Continue Reading

About Me

Emily Parker

Fashion is a distinctive and often constant trend in the style in which a person dresses. It is the prevailing styles in behaviour.

Journey of Ziri

New Block Theme