top of page


Prevention, Detection, Correction, Compensation, or Deterrence? Which one is what?
Cybersecurity can be confusing, especially with terms like prevention , detection , deterrence , correction , and compensation often...
parya hajimirzae
Sep 12, 20242 min read


S-P-I-aaS Decoded: Choose Your Cloud
Cloud computing has become a transformative and essential part of modern computing architectures for organisations of all sizes, stages,...
parya hajimirzae
Sep 6, 20243 min read


Cybersecurity key and lock: Cryptography
Cryptography is the art of securing information, ensuring that it can be read only by those intended to read it. It's the foundation of...
parya hajimirzae
Aug 31, 20243 min read


Cybersecurity Zoo of Malware
Imagine walking through a zoo filled with all sorts of wild and dangerous creatures, each with its own unique characteristics. But...
parya hajimirzae
Aug 28, 20242 min read


OSI, the Networking Seven Layer Cake
Welcome to the OSI model, a seven-layered cake of networking taste that helps data get from point A to point B. Each layer has its job...
parya hajimirzae
Aug 28, 20242 min read


Cyber Security Access Control
Cyber security is a crucial aspect of our digital world. With the increasing reliance on technology, ensuring your digital assets are...
parya hajimirzae
Aug 26, 20243 min read


Understanding Fundamental Security Concepts
"Computer security seeks to prevent unauthorised viewing (confidentiality) or modification (integrity) of data while preserving access...
parya hajimirzae
Aug 26, 20241 min read
bottom of page