from my opinions, thoughts, experiences, lessons learnt and that of my contributors
Apr
18

Why your customer abandoned the Software you just built.

Everybody looks forward to the birth of a baby in a family, we want to know what gender the baby is, the complexion, the size, the looks etc. While we are all eager to meet the little one, there is no-one who is…

Dec
26

What your Picture Says About You – Seeing Through the Lens of a Digital Camera

Pictures, they say speak more than a thousand words. This is true in all ramifications however you wish to describe it. But then; not many people realise that beyond the face and actions you see in a picture, there are some hidden data…

Nov
25

“To talk” or “Not-to-talk”? A security harm than good

I sometimes find myself with burning topics to write about, at times I develop such articles and then before I publish, my security mind tells me “Are you sure you re not going to be educating an attacker?” and in response, I end…

Nov
18

Can Your Organization Dare the Cyber Terrorists?

Picture of terrorits with guns

“Terrorist attacks can shake the foundations of our biggest buildings, but they cannot touch the foundation of America. These acts shattered steel, but they cannot dent the steel of American resolve.” The above is an excerpt from the speech made by the American…

Oct
6

Yet Another Journey in the Field of Cyber Security

July this year 2017, I had the rare opportunity to be #SelectedForChevening scholarship to study in the United Kingdom (UK).  I call it a ‘rare’ opportunity because I happened to be among the 43 successful candidates of the 6,043 applications submitted from Nigeria.…

May
25

Security – Who Else is Not Aware?

Two days ago, I was in the bank to make withdrawals using the Automated Teller Machine, (ATM) located in the bank premises. The queue was unusually long and each user spent at least 4-5 minutes on a transaction! I have never liked a…

Jan
28

I Have Had My Own “Unfair” Share

For a period close to 8 years, I have been an IT security Envangelist advocating for Software Quality Assurance as one way to maintaining the Confidentiality, Integrity and Availability of data in Information Systems. It was passion that moved me to this field,…