All posts by Dan K Jatau Sr. MSc, PhD, MBCS, MInstLM

Dan K Jatau is a Nottingham, UK-based Information security and technology infrastructure expert and researcher who likes to write about technology subjects from both a business and technical perspective. His current interests are business-driven security architectures, identity and access, the Cloud, virtualization security and all aspects of security. He currently works in security program development and architecture and develops enterprise security programs for SMEs.

threat modelling

10 Threat Modelling Tools Everyone doing Threat Modelling Should Be Using

Have you ever wondered how easy your Threat Modelling job would be with the right tools? This article provides ThreatModelling Tools to help you threat model efficiently. Tooling can help […]

The Ultimate Step-By-Step Guide to Vulnerability Assessment

Most often, cybersecurity professionals don’t know how to approach a vulnerability assessment, particularly when it comes to handling the results from automated vulnerability assessment report. This process can be of […]

Powering Business Through Cloud-Based Identity and Access Management

INTRODUCTION Businesses of all sizes and types are increasingly using cloud computing services in production deployments for business-critical operations. Some of these organisations use cloud services to store and process […]

Ten Simple Steps to An Effective Data Security Strategy

Most IT professionals realise that there is such a thing as a data lifecycle, but there’s no common rule on what it is. Lifecycle may be a misleading term, since […]

Privileged User Monitoring and Auditing

Why Continuous Monitoring is Critical for Enterprise Compliance and Security Foreword Recording the detailed actions of privileged users is more critical in today’s business environment that is driving cost efficiencies […]

Top 10 Tips on How to Improve Security Inside the Firewall

Big companies have significantly improved the security of the network perimeter, and despite considerable investments in this area, most enterprise networks remain vulnerable at their core. Techniques that have deployed […]

Cryptomining Hijacking – The Rising Malware Menace

In the last several years, cryptocurrencies like Bitcoin have been inaudibly growing in popularity, with an ever-larger number of people buying and selling them. With this gained popularity, bitcoin has […]

15 Practical Tips to Protect Your Computer from Viruses and Malware

Hackers (of the criminal variety) are a scary bunch—whether working as part of an organised unit or alone idealist with a political agenda, they’ve got the knowledge and the power […]

Top Ten Security Threats to Your Business and How to Protect Your Valuable Assets Against Them

Cybercriminals will always try to find ways to make money without having to do any of the hard work that comes with that. This occurs offline as well as online, […]

Next Generation Cybersecurity Solutions

Ten Recommendations for Choosing a Cybersecurity Solution for your Organisation. With cybersecurity at the centre stage of corporate boards’ agenda, there’s no shortage of security products on the market right […]

How to Establish Organisational Cyber Resilience and Agility

It’s Not Really About The 98% Caught, But Its About The 2% You Miss. Introduction You might become complacent and consider a cyber-attack against your business to be a remote […]

How to Build a Cybersecurity Program – Learn proven security strategies, techniques and best practices

The overall approach to developing a cybersecurity program, as with any venture should begin with pulling together a description of what is needed and why, to proceed to define how […]