Cybersecurity

The Need For Alert Evaluation In Cybersecurity

June 24, 2022 Adeniyi Salau 0

The Need For Alert Evaluation In Cybersecurity   The threat landscape is constantly changing as new vulnerabilities are discovered and new threats evolve. As a user and organizational needs change, so also does the attack surface. Threat actors have learned how to quickly vary the features of their exploits in […]

Using Sguil In Investigating Network Data

Ways Using Sguil In Investigating Network Data

June 24, 2022 Adeniyi Salau 0

  The primary duty of a cybersecurity analyst is the verification of security alerts. Depending on the organization, the tools used to do this will vary. For example, a ticketing system may be used to manage task assignments and documentation. In this article, I am going to talk about ways […]

13 Ways To Avoid Cyber Security Threats

13 Ways To Avoid Cyber Security Threats

August 21, 2021 Adeniyi Salau 0

In my previous article, I have discussed some of the facts that you need to know about phishing and Business Email Compromise generally.   In this article, I want to look at some of the facts that you need to put into consideration in order to avoid cyber security threats. […]

All You Need To Know About Wi-fi Technologies

All You Need To Know About Wi-fi Technologies

February 11, 2021 Adeniyi Salau 0

Wifi is the technology for wireless LAN. It is built based on the IEEE 802.11 standard. It started small but it has becomes the major standard for connecting endless devices without using cables.   One major problem with Wi-fi is that anyone listening can actually discover what is being communicated. […]

Facts About Endpoint Security Architecture

Facts About Endpoint Security Architecture

February 10, 2021 Adeniyi Salau 0

  An endpoint security architecture in the past means any personal device used by an end-user. It includes laptop desktop and other devices now it includes smartphones, IoT and other devices connected to a network.   Endpoints need to be secured because they are easy to point of entry into […]

network

14 Steps To Avoid Network Vulnerabilities

February 2, 2021 Adeniyi Salau 0

Here are some of the steps that you need to take to avoid the vulnerabilities of your mobile devices.     #1 Avoid joining Free Wi-fi First and foremost, you should be wary of free wifi, Some of these free wi-fi is set up in order to steal personal data. […]