-
Automotive Cybersecurity. An Introduction
Introduction to Automotive Cybersecurity Cybersecurity is the practice of protecting digital assets from malicious attacks. It is also referred to as “information technology security” or “electronic information security.” The term is used in a variety of contexts, but in this article, we will be considering cybersecurity in the context of automobiles. The automobile industry has…
-
Five (5) frameworks for improving cybersecurity
A cybersecurity framework provides a set of baseline best practice criteria with a goal to further strengthen the cybersecurity posture of any organization where it is implemented. Having these frameworks in place, it becomes easy to define standard processes and procedures which sustains confidentiality, integrity and availability. In this article, we will talk about five…
-
Top 10 Cybersecurity Subreddits for Security Professionals
Reddit is a social news website and forum where information is socially vetted and promoted by site members voting. The name of the website is a pun on the phrase “I read it.” Reddit is fragmented into over a million communities known as “subreddits,” each of which tackles a certain topic. A subreddit’s name begins…
-
Openid connect and oauth overview
Over the past articles, we have been exploring the world of the middleman (Api). We have been sufficiently able to break the concept down describing what it is, the advantages it presents, how to make it secure and the tools used for assessing its security posture. In this article, we are going to explore two…
-
Computer Network Protocols: What it is and how it works
Computer Network Protocols… What it is and how it works Network protocols is a word I’m sure you have heard in use among diverse technology professionals. In this article, I will try to explain what it is and some of the network protocols employed by information systems. Let’s start with Computer Networks. This simply put…
-
A Run Through Owasp Top 10:2021
OWASP top 10 and how it works What is OWASP The Open Web Application Security Project (OWASP) is a non-profit foundation dedicated to improving the security of software. OWASP operates under an ‘open community model, this model enables anyone both to participate and contribute to projects, events, online chats, and more. All materials and information…
-
Nmap Cheatsheet X
Network mapper (NMAP) is an opensource security tool used for network exploration, security scanning and auditing In this article, I will be listing some important Nmap commands that will make network assessment easy. Let’s go! Scan single Ipaddress: nmap ipaddress Scan a host: nmap server1.abc.xyz Scan a host with more information: nmap -v server1.abc.xyz Scan…
-
Social Engineering: The pervasive art of deception
Social Engineering like the term suggests refers to a diverse range of activities employed by malicious parties with the aim of luring unsuspecting victims to divulge sensitive information which will impact their online safety and might lead to financial loss. This tactic has been increasingly employed by malicious parties in recent years, as it is…
-
Phishing Crossword
I bet you’re wondering how to play this game……Don’t overthink it, I’ve explained below how to go about it. There are some empty boxes you’re expected to fill with words. The boxes are numbered in line with the clues listed below. Follow the clues to fill the boxes with the appropriate words, right words are…
-
Open Source Tools in Cybersecurity
I have previously written on open source. Here is the link to that article, for more understanding. Today, I want to talk about open source tools. In this article I will discuss 10 open source tools that hackers and security researchers use to gather intelligence,before the real assessment or hacking is done. First, what are…
-
Blockchain Oracles: What are they and how do they work?
In the past few articles, I have written about blockchain, smart contract, smart contract audit and cryptojacking. I saw it fit to do a piece on blockchain oracles and we will be exploring this topic on the borders of: What are blockchain oracles? Blockchain Oracles Use case Types of oracles The oracle problem Blockchain oracles…
-
Auditing Smart Contract
I did a piece on smart contract where I detailed the basics of the technology, how it works, platforms that drive smart contract and its diverse use case. The article can be found here: Smart Contract. In this article, we will further explore smart contracts by considering the security. let us break down Auditing Smart…
-
Smart Contracts
What are contracts ? What is a Smart Contract ? Smart Contract Platforms Sample Smart Contract code Smart Contract use case A contract is a legally binding document between at least two parties that defines and governs the rights and duties of the parties to an agreement. The concept of contracts is so prevalent today,…
-
Things your boss wishes you knew about Information Technology Risk.
Information technology is a new world entirely and it is so broad it is almost impossible to know all facets of it in depth. Information Technology is one of the branches of ICT
-
Top 5 cybersecurity experts you must follow in 2021
Compiled in this piece in no particular order are the names of our top 5 cyber security experts you must follow if you are serious about cyber security in 2021.
-
An Introduction to Blockchain
An Introduction to Blockchain What is Blockchain technology? History of Blockchain Breaking things down Benefits of blockchain What does all this mean? What is Blockchain Technology? Blockchain is a system that makes recording of information foolproof, such that it is difficult to alter or cheat the system. It employs the use of a decentralized digital…
-
The Biggest Problems With Information Technology Audit, And How You Can Fix It
As technology and innovation maintains an upward thrust in our constantly evolving world of today, Information technology has rapidly become a very vital part of the growth of businesses at different scales and by extension the economy. The activities of Information technology is synonymous to that shiny Ferrarri f8 tributo that goes from 0 –100…