PinnedGloria AsuquoEmpowering Blockchain Technologies through Open SourceThe adoption of blockchain on such a vast scale would not have been possible without the open-source system. Oh yes! The contribution of…5 min read·Jun 13, 2022----
Gloria AsuquoUnderstanding CVE, CWE and NVD: Foundations of CybersecurityVarious standards, databases, and frameworks have been developed to enhance our comprehension of vulnerabilities and security weaknesses…2 min read·Oct 30, 2023----
Gloria AsuquoTypes of Web Application Attackers are all over the internet seeking for ways to exploit users of the internet. The web is a very important aspect of the…2 min read·Oct 25, 2023----
Gloria AsuquoTitle: Understanding CVE, CWE, and NVD: Foundations of Cybersecurity2 min read·Oct 9, 2023----
Gloria AsuquoList Summary of SANS TOP 25The SANS Institute, a renowned organization dedicated to cybersecurity education and research, periodically releases a list known as the…3 min read·Oct 9, 2023----
Gloria AsuquoA Comprehensive Guide to Scanning Tools: Enhancing CybersecurityIntroduction2 min read·Oct 3, 2023----
Gloria AsuquoMastering Network Discovery: Top Nmap CommandsDecided to do vintage and of course the movie "WarGames" (1983), directed by John Badham gave me the moment I craved for😂. The film is…3 min read·Oct 3, 2023----
Gloria AsuquoUnderstanding the Difference between Footprinting and Reconnaissance2 min read·Sep 27, 2023----
Gloria AsuquoHosting my first tech event: Google I/O ExtendedYou would never know how good/bad you are something until you try it.5 min read·Jun 20, 2022----