PinnedGloria AsuquoEmpowering Blockchain Technologies through Open SourceThe adoption of blockchain on such a vast scale would not have been possible without the open-source system. Oh yes! The contribution of…Jun 13, 2022Jun 13, 2022
Gloria AsuquoUnderstanding CVE, CWE and NVD: Foundations of CybersecurityVarious standards, databases, and frameworks have been developed to enhance our comprehension of vulnerabilities and security weaknesses…Oct 30, 2023Oct 30, 2023
Gloria AsuquoTypes of Web Application Attackers are all over the internet seeking for ways to exploit users of the internet. The web is a very important aspect of the…Oct 25, 2023Oct 25, 2023
Gloria AsuquoTitle: Understanding CVE, CWE, and NVD: Foundations of CybersecurityOct 9, 2023Oct 9, 2023
Gloria AsuquoList Summary of SANS TOP 25The SANS Institute, a renowned organization dedicated to cybersecurity education and research, periodically releases a list known as the…Oct 9, 2023Oct 9, 2023
Gloria AsuquoA Comprehensive Guide to Scanning Tools: Enhancing CybersecurityIntroductionOct 3, 2023Oct 3, 2023
Gloria AsuquoMastering Network Discovery: Top Nmap CommandsDecided to do vintage and of course the movie "WarGames" (1983), directed by John Badham gave me the moment I craved for😂. The film is…Oct 3, 2023Oct 3, 2023
Gloria AsuquoUnderstanding the Difference between Footprinting and ReconnaissanceSep 27, 2023Sep 27, 2023
Gloria AsuquoHosting my first tech event: Google I/O ExtendedYou would never know how good/bad you are something until you try it.Jun 20, 2022Jun 20, 2022