• Five Resources on Data Privacy

    Data privacy in our world today is a very serious global issue, especially as the use of digital devices has become prevalent. A lot of companies in recent times have sold people’s personal data to third parties (other companies and private individuals) for many reasons for which advertising is paramount. This is why learning about…

    Continue Reading

  • A journey into Data Privacy

    The world digital trail has become common. Ip addresses, cookies etc and every activity we take part in online leaves a trail. Information privacy is there to ensure the details that we drop online are protected, and that our personal information online is not accessed by illegal entities. What is Data privacy? Data privacy can…

    Continue Reading

  • Logging VS Monitoring and  Why you need both.

    Logging and monitoring is a term that is largely spoken about in security circles, as it plays an essential role in investigating, fine-tuning the security posture of a single digital asset or group of assets. An error log is a list of every issue affecting a server, network, operating system, or device. These log files…

    Continue Reading

  • An overview of Identity Theft

    Identity theft is a very serious security challenge, as experts believe that these cases occur so often that there is a new victim every 22 seconds. According to identitytheft.org, over 48 million identity theft cases recorded in 2020. This was an increase of 3.3% compared to the cases in 2019. Experts suggest that this problem…

    Continue Reading

  • SECURE CONFIGURATION: CIS vs STIG BENCHMARK

    During the development, building, and installation of software, databases, computers, computer devices, and network services, secure configuration is the security measure kept in place to reduce vulnerability. Why is Secure Configuration necessary? The famous saying “default settings” is an example of a set of configurations an application, database, operating system, etc. comes shipped with, which…

    Continue Reading

  • DevSecOps: An Overview

    When done the right way, DevOps implementation is sure to bring about better collaboration among teams, faster time to market, improved productivity, enhanced customer satisfaction, and increased efficiency. Unfortunately, all these efficiencies and enhancements that come with DevOps are almost useless without security. That is why DevSecOPs is the introduction of security practices into DevOps.…

    Continue Reading

  • Application Programming Interface (Api)

                                  Application Programming Interface explained Application Programming Interface, or API, is a software bridge that enables communication between two applications. You utilize an API every time you use a mobile app like Facebook, send an instant message, or check the weather. Application programming interface, or API, is a concept that can be used in a variety…

    Continue Reading

  • Conformance Testing: An overview

    Conformance testing is a software testing technique used to ensure that a software system meets the standards and regulations established by IEEE, W3C, or ETSI. Conformance testing determines how a system under test meets the individual requirements of a specific standard. Compliance testing is another name for conformance testing.    It deals with some technical aspects.…

    Continue Reading

  • The Art of Software Testing

    Software Testing is a technique used to check or confirm whether a software product meets the expected requirements and to ascertain that the software product has no defects. It involves the running of software/system components using manual or automated tools to examine one or more specifications of interest. The main reason for software testing is…

    Continue Reading

  • Five Questions About Mobile App Security

    Five questions about App security Mobile app security has always been a source of concern. It has even become more important than ever as mobile devices become part of our everyday lives. People are more reliant on their mobile devices, especially their mobile phones, to access everything from banking information to regular updates on live…

    Continue Reading

  • Intrusion Detection System

    An intrusion detection system (IDS) is a device or software application that monitors network traffic for suspicious activities and alerts when such activities are discovered. While detecting and reporting malicious threats and abnormalities are the basic functions of an IDS, some intrusion detection systems can also take action when malicious activities or abnormal traffic is…

    Continue Reading

  • Network Orchestration

    What is network orchestration? Network orchestration is the automation of networks across different types of infrastructure devices, network domains, and even multi-vendor systems with a network. In addition, orchestration can be policy-based or event-driven automation through the use of programmatic interfaces like RESTful APIs that are enabled by third-party software or a network infrastructure solution…

    Continue Reading

  • Network Security Resources

    In the previous article on Network Security Fundamentals, I explained network security and its foundations.  Why is network security important? Most companies in recent times heavily rely on computers to share information and keep information safe. Especially in a large scale company with a large number of staff each expected to have a personal workstation,…

    Continue Reading

  • Networking Security

    Networking Security Fundamentals

    Networking is the process of creating connections between devices. It can be used to transmit data, share resources, and provide internet access. Network security is a system that protects networks from unauthorized access and use. The purpose of networking is to enable communication between devices. This can be done by connecting them directly to one…

    Continue Reading

  • Email Security 

    E-mail was designed to improve accessibility/communications. But the problem is that it isn’t very secure. Email Phishing attacks have been increasing in frequency, and it doesn’t seem likely to stop anytime soon, with large companies and high-profile individuals the common targets.  Attackers use emails that appear authentic to deceive recipients enticing them to part with…

    Continue Reading

  • 7 Emerging Blockchain Technology Trends to Follow in 2022

    Blockchain technology has been hailed as one of the most significant technological breakthroughs in recent years. Check out our article on blockchain technology. Manufacturing and education are among the industries that are affected. Blockchain technology is a permission-free, publicly accessible database system with encryption and centralization for security. To ensure network reliability and stability, blockchain…

    Continue Reading

  • Internet of Things (IoT)

    In this article, we will be taking a journey to understand Internet of Things (IoT), and to this end, the journey will be guided by the underlisted: What is IoT? The evolution of IoT Use cases of the Internet of Things IoT products What is IoT?  The Internet of things describes physical objects with sensors,…

    Continue Reading

  • Artificial Intelligence as a Service (AIaaS)

    Artificial intelligence as a service (AIaaS) refers to off-the-shelf AI tools that allow businesses to implement and scale AI techniques at a fraction of the cost of a full-fledged in-house AI.  Because it is based on cloud computing, the concept of everything as a service refers to any software that can be accessed across a…

    Continue Reading

  • NFT Hype? Answer to the 5 most frequently asked questions.

    Almost every technology-savvy person has heard the term Non-Fungible token (NFT) in the last few months. The excitement grew, even more, when a digital asset was sold for a whopping $69 million naira. Woah! That was revolutionary, and since then, many celebrities and even crypto investors have jumped on the NFT bandwagon, including Tom Brady…

    Continue Reading

  • Data Tokenization vs Data Encryption

    Data tokenization and data encryption are two major words you would often come across in the world of data security. Is data tokenization the same as data encryption? What are the differences if they are not the same? Is there any sort of similarity between them? These questions will be answered in this article. What…

    Continue Reading

  • Metaverse: Risks associated with it and how to mitigate them.

    In case you missed the previous article where metaverse and its advantages were explained, please click on this link to read  Risks associated with the metaverse and how to mitigate them. As the boundaries between reality and the virtual worlds are gradually but steadily getting blurred. The innovation of the metaverse technology keeps increasing, the…

    Continue Reading

  • The virtual world called “Metaverse”

    The Metaverse has been a very hot topic in the past few weeks since the founder of Facebook “the big Mark” switched the name of the popular social networking platform and its subsidiaries to META, and he explained the plans of the company as it relates to metaverse in a live stream. The term has…

    Continue Reading

  • Database activity monitoring

    What is Database activity monitoring (DAM)? The process of observing, identifying, and reporting the activities carried out within a database with minimal effect on the performance of the system is called Database activity monitoring (DAM). Database activity monitoring is carried out by use of instantaneous security technology tools that give real-time monitored updates, analysis, and…

    Continue Reading

  • Network Data Loss Prevention

    In this post, I will talk about network data loss prevention (DLP), its importance, and some available dlp solutions. I have written some articles in the past about data, read through the blog to get updated. What is network dlp? While data is in motion, network data loss prevention (DLP) software monitors, detects and potentially…

    Continue Reading

  • Email Security

    Email security is a vital necessity because email contains sensitive information. Due to the high usage of such means of information transfer, it has since become a major target for attack. This and many more reasons are why companies are favoring the use of cloud-based email services like Gmail, Outlook, Protonmail, etc. What is Email…

    Continue Reading

  • Data Privacy: Definition and Overview

    The world has gotten so small, as information has become more accessible, shareable, and more vulnerable. Data privacy is the security of personal information from unwanted access by third parties and determines who has access to the information. Personal information like age, location, contact information in both real-time and online platforms are usually open to…

    Continue Reading

  • Malware forensic: An overview

    If a simple action such as clicking on a link or opening an email can cause disastrous outcomes, then Malware and Malware forensic cannot be overlooked. In my last post, I explained malware, how it works, antimalware and antimalware tools. Check it out here for more understanding. What is Malware Forensic: Malware is the collective…

    Continue Reading

  • MALWARE: EVERYTHING YOU NEED TO KNOW ABOUT IT

    Malicious Software popularly known as MALWARE is the collective name for any program or software that intentionally puts a computer, a server, a network or group data at risk.  Malware is a set of code written or developed by cyber attackers with the aim of intentionally harming certain data set or gaining unauthorized access into…

    Continue Reading

  • 5 steps to ensure a better home network security

    A home network refers to a group of devices connected to each other and to the internet through either a wireless or wired network connection. Ensuring the home network security is strong and up to date is an important part of network security. In this short article I will be listing out 5 steps to…

    Continue Reading

  • Mobile Device Security

    Mobile security is the security measures put in place to avoid risk and vulnerability of data and assets loss attached to using mobile computing devices like smartphones, laptops, Tablets etc. What is so important about Mobile security? The use of Mobile Devices is the future: Slowly and gradually technology has evolved from using stationary devices…

    Continue Reading

  • Introduction to Cloud Computing

    The idea of cloud computing might seem like a seriously big deal. Don’t worry I got you today. What is cloud computing? Cloud computing according to The National Institute of Standards and Technology (NIST) is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers,…

    Continue Reading

  • 5 Mobile technology apps for Information Technology risk

    can be used for information technology risk in no particular order. 1) Active Risk Management 2) Fusion Risk Management…

    Continue Reading

  • Think You’re Cut Out for Information Technology? Take This Quiz

    Working in Tech is the new slogan. Everyone today wants a bite from the information technology pie, with this rat race of getting involved with technology, do you think you are cut out for Information Technology? Are you planning to switch careers to Information Technology? Are you wondering if you can cope and survive in…

    Continue Reading

  • Oracle Human Resources Management System

    Oracle Human Resources Management System (HRMS) is a major component of the Oracle E-Business Suite of applications.Simply put, It is an integrated suite of applications which supports every aspects of the HR function. There are several modules defined in Oracle HRMS eg Oracle Human Resources (HR),Oracle Payroll,Oracle Performance Management,Oracle iRecruitment,Oracle Time & Labor(OTL) etc.In this post…

    Continue Reading

  • Ransomware

    With the increasing rate of ransomware, the need to protect files and networks have become essential. Especially if as a company you store a lot of data on your server and you transfer a lot of data also. Both your server and information transfer process needs to be secured to guard against ransomware. What is…

    Continue Reading

  • Cryptojacking: what it is, how it works and how to prevent it.

    In recent times, I believe the worst that can happen to anyone who trades, invests in cryptocurrency is Cryptojacking. I have written some articles about  blockchain and smart contract, read more for better understanding on this topic.  What is Cryptojacking? Let me break it down, the word cryptojacking  was coined from two words Cryptocurrency and…

    Continue Reading

  • Open source: 5 things you need to know about it to better your use of it.

      Gone are the days when mentioning the use of Open source software was considered taboo in companies or business settings. Over time, it use has become acceptable, in fact, open source software is the first consideration when the need arises. While it is now acceptable, it may not be what it seems to be,…

    Continue Reading

  • DDoS: What does it mean?

    Distributed denial of service (DDoS) is an attack such that the source website of a company is bombarded with a lot of requests that are more than its capacity, which then affects the ability of the website to function properly. With the rapid recurrence of such attacks, many companies whose business model requires a massive…

    Continue Reading

  • Hacking: The untold truths about hacking

    Hacking has been associated with a lot of things both legal and illegal. The common image that comes to mind when people hear hacking is that of an individual wearing a mask with a disturbed radio-like robotic voice, a laptop probably wearing a red or black jumpsuit with a lot of pizza boxes thanks to…

    Continue Reading

  • Evaluating Oracle Weblogic Middware Controls

    WebLogic is Oracle’s proprietary application server. It is Java base and Inherited when it acquired BEA Systems in 2008.it’s used by many businesses to build and deploy enterprise applications. Weblogics popularity and widespread use has made it a target by malicious individuals.In this post, I will provide you with suggested control that can be implemented…

    Continue Reading

  • What is Honey pot in cybersecurity?

     Honeypot calls to remembrance the Trojan Horse a concept first put to use in the Greek mythology. It’s an open gift that is part of a game plan. Due to the concurrent incidence of cyberattack, cybersecurity experts then thought of it. Why wait for them to attack first? Why don’t we attract them using a…

    Continue Reading

  • Insider threat and what you need to know about it

    The unfortunate thing about threats, risk to your data, information and security is that it starts internally little wonder it is called an Insider threat. Most attacks  on business security and information are not  cases of a well designed malicious masks and glove wearing  group called Hackers. What is an Insider Threat? An insider threat…

    Continue Reading

  • FORENSIC AUDIT. AN INTRODUCTION

    A forensic audit involves going through a firm’s financial record to get evidence that can be used legally in a court of law or for legal proceedings. Big Industries and companies have a forensic audit department. A forensic audit is a special part of accounting that requires expertise in accounting procedures and legal framework. A…

    Continue Reading

  • FAQs and Answers in Information Technology Risk

    When Big names in the finance, commerce and other industries cannot protect their data, this implies that they are having information leakages and issues recovering their data and here is the point where Information Technology risk comes in. Information Technology risk assists in minimizing the risks associated with the technology environment of a company. It …

    Continue Reading

  • 5 Undeniable Reasons to Love Information Technology Control

    In your quest in choosing a career path have you considered  Information Technology Control? Choosing a career path can be quite tedious and require a lot of thoughts and research . If you have ever considered a career in IT Control, here are 5 more reasons why you would love the course or career. It…

    Continue Reading

  • Top 5 Information security professionals to follow on Linkedin

    According to reports, Cyber security is currently one of the hottest trends in the IT world- CyberSecurity Venture Report predicted that by the year 2021 the world’s total cyber crime damage will amount to a total of $6 trillion while spending on cybersecurity will exceed $1 trillion. Wow! $1 trillion to save $6 trillion. That…

    Continue Reading

  • 5 Resources That will Make You Better at Information Technology Risk

    Information Technology Risk has a very important role to play in the risk management field as it brings to the fore the body of risks that can hamper the achievement of business objectives as it concerns the technology environment. In this article, I have listed out five (5)  resources that will not only make you…

    Continue Reading

  • How to sell Information Technology Audit to a skeptic

    Information Technology Audit  is a sub-field under the Audit function which has garnered a lot of interest in the past few years, largely because of the widespread adoption of technology to drive the core and ancillary parts of businesses. It has become more important because businesses want to address the risk of material misstatements as…

    Continue Reading

  • 5 savvy ways to spend leftover Information Technology Assurance budget.

    So you have adequately covered all areas of your Information Technology Assurance Budget. then you realize that woah!  You still have leftover cash. Now you are wondering what should I do with this leftover budget?  How do I spend it? Think No more, I have 5 ways you can spend your leftover information technology assurance…

    Continue Reading

  • Information Technology Control: Misconceptions Vs Reality.

    Information Technology Controls are specific safeguards put in place in a technology-driven environment to ensure that risks are reasonably stemmed, and business objectives are achieved.  Technology controls are a big deal in our technology-driven world of today, owing to the fact that almost all our activities, both at the personal and organizational level have a…

    Continue Reading

  • Information Assurance Explained in Fewer than 140 words

    Information Assurance is a lot to talk about but I have a word count challenge to fulfil.. Endeavour to rate me at the end of the post.  Lets go What is information assurance? It is the continuous reviewing and  testing of information and systems in order to ascertain it’s integrity, availability and confidentiality. Let me…

    Continue Reading

  • Will Information Technology Ever Rule the World?

    I feel the right question should be to what extent is information technology ruling the world? Let us consider Information Technology…

    Continue Reading

About Me

Emily Parker

Fashion is a distinctive and often constant trend in the style in which a person dresses. It is the prevailing styles in behaviour.

Journey of Ziri

New Block Theme

Address: 23 Sanctuary Avenue, Obalipede Estate, Onikoko, Abeokuta, Ogun State
phone number: +2347015513322
Email Adderess: admin@assurecondo.com