Author: nwnkq

  • Cyber Risk Mitigation

    Risk Mitigation focuses on minimizing the harm of a particular risk. This may involve taking measures to reduce the likelihood of the risk occurring or developing contingency plans to mitigate the damage if the risk does occur. For example, a company may invest in cybersecurity measures to mitigate the data breach risk or develop a…

  • Application Mordernization

    Application modernization is the process of taking existing legacy applications and modernizing their platform infrastructure, internal architecture, and/or features. The benefits of application modernization can typically be summarized as improving the velocity of new feature delivery, exposing the functionality of existing applications to be consumed via API by other services, and re-platforming applications from on-premises…

  • Common Cyber Security Vulnerabilities

    Cyber vulnerabilities pose a risk to ICT infrastracture including cloud services, mobile devices and IoT. Below is a list of leading  Misconfiguration This is one of the leading threats in cloud and application security.This occur when settings are not well defined. This happens in the set up of the of the infrastructure eg a poorly…