Jacob ideji
Home
Home
About me
About me
Engagement
Engagement
Leadership
leadership
Blog
Blog
linkedin
linkedin
jacob ideji
Home
About me
Engagement
Leadership
Blog
Linkedin
Our Blog
Home
Blog
Our Blog
Latest Blog & Articles
By
Admin
2025-06-02
Addressing design vulnerabilities through the CISA secure-by-design approach.
Read More
By
Admin
2025-06-02
The AIDS Trojan Horse, created by Joseph L. Popp, introduced ransomware 34 years ago. However, ransomware remains a widely misunderstood phenomenon.
Read More
By
Admin
2025-06-02
What CYBERSECURITY can learn from Morocco's defense strategy at the World Cup.
Read More
By
Admin
2025-06-02
A CISO Security War Room. The New Corporate Panic Room.
Read More
By
Admin
2025-06-02
Lessons from Cyrus the Great's Conquest of Babylon: Knowing Your Adversaries and Cyber Defenses.
Read More
By
Admin
2025-06-02
Why the Balance of Power in Cyberspace Favors Threat Actors Economically.
Read More
By
Admin
2025-06-02
Exercising caution with vendors claiming products as zero-trust solutions, especially if the product has a long history.
Read More
By
Admin
2025-06-02
Zero Trust Design Thinking Methodology
Read More
By
Admin
2025-06-02
𝐙𝐞𝐫𝐨 𝐓𝐫𝐮𝐬𝐭 𝐚𝐧𝐝 𝐀𝐈: 𝐖𝐢𝐧𝐧𝐞𝐫𝐬 𝐀𝐫𝐞 𝐃𝐞𝐟𝐢𝐧𝐞𝐝 𝐛𝐲 𝐄𝐱𝐞𝐜𝐮𝐭𝐢𝐨𝐧, 𝐍𝐨𝐭 𝐖𝐨𝐫𝐝𝐬.
Read More
1
2
3
»
Copyright © 2025. All rights are reserved.