OshamndubisiPCI DSS 4.0: The Detailed Beginner’s Guide (2)In the first part of this guide, I wrote about the body behind PCI DSS which is PCI SSC, key PCI DSS terminologies, the entities PCI DSS…Jul 19Jul 19
OshamndubisiThe Key Regulatory Agents in the African Financial SpaceWhy is it important for a Cybersecurity GRC Analyst to be familiar with regulatory agents?Jun 24Jun 24
OshamndubisiAoC Day 14: How Algorithms Power Cybersecurity DefenseIf you want to get computers to think and act like humans or mimic human intelligence, Machine Learning is your guy.Dec 15, 2023Dec 15, 2023
OshamndubisiPrompt Injection Attacks and AI ChatbotsSo I am participating in the TryHackMe Advent of Cyber Challenge!Dec 1, 2023Dec 1, 2023
OshamndubisiSimplifying Enterprise Cyber Risk ManagementLeaving your home is risky because anything can happen on your way to your destination. Staying at home is also risky, you could slip, fall…Nov 30, 2023Nov 30, 2023
OshamndubisiThe case of two models: OSI and TCP/IP ModelNigeria is a multilingual country with over 500 languages/dialects spoken by its people.Nov 10, 2023Nov 10, 2023
OshamndubisiSimplifying Workloads in the Cloud?What do we mean when we say “Workloads” in the cloud? At the initial stages of my cloud learning journey, the term “Workloads” confused me…Sep 29, 2023Sep 29, 2023