from my opinions, thoughts, experiences, lessons learnt and that of my contributors

Why your customer abandoned the Software you just built.

How Customers can Get Value from Agile

Everybody looks forward to the birth of a baby in a family, we want to know what gender the baby is, the complexion, the size, the looks etc. While we are all eager to meet the little one, there is no-one who is…


What your Picture Says About You – Seeing Through the Lens of a Digital Camera

Pictures, they say speak more than a thousand words. This is true in all ramifications however you wish to describe it. But then; not many people realise that beyond the face and actions you see in a picture, there are some hidden data…


“To talk” or “Not-to-talk”? A security harm than good

I sometimes find myself with burning topics to write about, at times I develop such articles and then before I publish, my security mind tells me “Are you sure you re not going to be educating an attacker?” and in response, I end…


Can Your Organization Dare the Cyber Terrorists?

Picture of terrorits with guns

“Terrorist attacks can shake the foundations of our biggest buildings, but they cannot touch the foundation of America. These acts shattered steel, but they cannot dent the steel of American resolve.” The above is an excerpt from the speech made by the American…


Yet Another Journey in the Field of Cyber Security

July this year 2017, I had the rare opportunity to be #SelectedForChevening scholarship to study in the United Kingdom (UK).  I call it a ‘rare’ opportunity because I happened to be among the 43 successful candidates of the 6,043 applications submitted from Nigeria.…


Security – Who Else is Not Aware?

Two days ago, I was in the bank to make withdrawals using the Automated Teller Machine, (ATM) located in the bank premises. The queue was unusually long and each user spent at least 4-5 minutes on a transaction! I have never liked a…


I Have Had My Own “Unfair” Share

For a period close to 8 years, I have been an IT security Envangelist advocating for Software Quality Assurance as one way to maintaining the Confidentiality, Integrity and Availability of data in Information Systems. It was passion that moved me to this field,…