top of page


Prevention, Detection, Correction, Compensation, or Deterrence? Which one is what?
Cybersecurity can be confusing, especially with terms like prevention , detection , deterrence , correction , and compensation often...
parya hajimirzae
Sep 12, 20242 min read


S-P-I-aaS Decoded: Choose Your Cloud
Cloud computing has become a transformative and essential part of modern computing architectures for organisations of all sizes, stages,...
parya hajimirzae
Sep 6, 20243 min read


Cybersecurity key and lock: Cryptography
Cryptography is the art of securing information, ensuring that it can be read only by those intended to read it. It's the foundation of...
parya hajimirzae
Aug 31, 20243 min read


From Paranoia to Protection: How Zero Trust Enhances Cybersecurity
While the term " paranoia " typically carries negative connotations, in cybersecurity, it can be a powerful asset. Just as someone who is...
parya hajimirzae
Aug 29, 20241 min read


Cybersecurity Zoo of Malware
Imagine walking through a zoo filled with all sorts of wild and dangerous creatures, each with its own unique characteristics. But...
parya hajimirzae
Aug 28, 20242 min read


OSI, the Networking Seven Layer Cake
Welcome to the OSI model, a seven-layered cake of networking taste that helps data get from point A to point B. Each layer has its job...
parya hajimirzae
Aug 28, 20242 min read


Vintage Security
While reading Security in Computing, 6th Edition by Charles Pfleeger, Shari Lawrence Pfleeger, and Lizzie Coles-Kemp, I came across this...
parya hajimirzae
Aug 26, 20242 min read


Cyber Security Access Control
Cyber security is a crucial aspect of our digital world. With the increasing reliance on technology, ensuring your digital assets are...
parya hajimirzae
Aug 26, 20243 min read


The Power of Change Management in Strengthening Security
Think of change management as a safety net for your IT environment. It’s a structured way to plan, test, and implement changes without...
parya hajimirzae
Aug 26, 20241 min read


Understanding Fundamental Security Concepts
"Computer security seeks to prevent unauthorised viewing (confidentiality) or modification (integrity) of data while preserving access...
parya hajimirzae
Aug 26, 20241 min read
bottom of page