CIS Control 1: Inventory and Control of Enterprise Assets A step-by-step guide for implementing Governance, Risk & Compliance audits for 13 minute read
Case-study – Target Data Breach 2013 Hackers gained access to more than 40 million credit and debit card information 6 minute read
25 Meaningful Things You Can Do in 30 Minutes or Less If envy and jealousy are impacting your friendships 2 minute read
Find the error or output for the following C code. Buffer Overflow Attack Real-life Example, Buffer Overflow C, Buffer Overflow C 1 minute read
CIS Control 1: Inventory and Control of Enterprise Assets A step-by-step guide for implementing Governance, Risk & Compliance audits for byJake AdebayoMay 22, 2023
Case-study – Target Data Breach 2013 Hackers gained access to more than 40 million credit and debit card information byJake AdebayoOctober 24, 2022
25 Meaningful Things You Can Do in 30 Minutes or Less If envy and jealousy are impacting your friendships byJake AdebayoFebruary 27, 2020
Find the error or output for the following C code. Buffer Overflow Attack Real-life Example, Buffer Overflow C, Buffer Overflow C byJake AdebayoFebruary 25, 2020
Incident ResponseJanuary 20, 2020 You Don’t Have to Be Vegan to Eat Sustainably Give yourself the best manicure at home with these expert tips byJake Adebayo
Penetration TestingJanuary 19, 2020 How to Take Care of Yourself This Winter Why some fashion influencers are going off the grid byJake Adebayo
Incident ResponseJanuary 18, 2020 What I Learned From Volunteering Abroad The evolution of bridal style through the years byJake Adebayo