CIS Control 1: Inventory and Control of Enterprise Assets A step-by-step guide for implementing Governance, Risk & Compliance audits for 13 minute read
Case-study – Target Data Breach 2013 Hackers gained access to more than 40 million credit and debit card information 6 minute read
25 Meaningful Things You Can Do in 30 Minutes or Less If envy and jealousy are impacting your friendships 2 minute read
Find the error or output for the following C code. Buffer Overflow Attack Real-life Example, Buffer Overflow C, Buffer Overflow C 1 minute read
CIS Control 1: Inventory and Control of Enterprise Assets A step-by-step guide for implementing Governance, Risk & Compliance audits for byJake AdebayoMay 22, 2023
Case-study – Target Data Breach 2013 Hackers gained access to more than 40 million credit and debit card information byJake AdebayoOctober 24, 2022
25 Meaningful Things You Can Do in 30 Minutes or Less If envy and jealousy are impacting your friendships byJake AdebayoFebruary 27, 2020
Find the error or output for the following C code. Buffer Overflow Attack Real-life Example, Buffer Overflow C, Buffer Overflow C byJake AdebayoFebruary 25, 2020
View on YouTube Penetration TestingFebruary 27, 2020 25 Meaningful Things You Can Do in 30 Minutes or Less If envy and jealousy are impacting your friendships byJake Adebayo