Farayi

A Cybersecurity Consultant

Menu
  • Home
  • About Me
  • Frameworks
  • Blog
  • Projects
  • Contact Me
Menu

Author: Farayi Dzichauya

2024 Cyber Forecast

Posted on 02/01/202404/04/2025 by Farayi Dzichauya

We are going to see improvements in the exploration of generative AI and large language models by criminals in phishing, sms, and various social engineering attacks. These technologies will allow attackers to increase the scale of their operations which leaves victims talking to bots. We are likely to see automated phishing Campaigns – AI can…

Read more

Key Strategies to Enhance Your Online Security

Posted on 28/11/202304/04/2025 by Farayi Dzichauya

In the digital age, securing your online presence is paramount. The internet, while a hub of information and connectivity, can also be a playground for cyber threats. This guide explores twelve key strategies to fortify your digital life against potential vulnerabilities, offering a blend of convenience without compromising security. Understanding the Importance of Online Security…

Read more

How to protect yourself from cybersecurity attacks.

Posted on 30/10/202303/06/2025 by Farayi Dzichauya

I often get asked by my friends and family how to stay safe online so I have decided to put something together. There is always friction between convenience and security – as a rule of thumb, the more secure something is the less convenient it is. There are obvious exceptions though. Here are some tips…

Read more

Ransomware ecosystems

Posted on 26/10/202304/04/2025 by Farayi Dzichauya

Ransomware has been with us for a while and initially was mostly focused on encrypting individual devices. In 2013, CryptoLocker, a ransomware attack by the GameOverZeus organised crime group, combined strong public key encryption with cryptocurrency payments, making it a profitable business model. Attackers began to target large organisations instead of small businesses or individuals,…

Read more

Principle based assurance in Cybersecurity

Posted on 11/05/202304/04/2025 by Farayi Dzichauya

Principle-based assurance (PBA) is an approach to cybersecurity assurance that focuses on the underlying principles of a system or process, rather than on specific controls or procedures. This approach is based on the idea that if the underlying principles of a system or process are sound, then the system or process is likely to be…

Read more

Who doesn’t want to write secure code?

Posted on 28/03/202204/04/2025 by Farayi Dzichauya

Software engineers typically make hundreds of decisions every day and in my experience no one sets out to write insecure code, so everyone is well meaning however in those decisions some have a bearing on security outcomes and some don’t. It is vital that developers spot security-relevant decisions as they are encountered, and have a clear…

Read more

Transport Layer Security

Posted on 14/03/202204/04/2025 by Farayi Dzichauya

Transport Layer Security(TLS), is a commonly used security protocol designed to facilitate secure communications over the internet. A typical use case of TLS is encrypting the communication between web applications and servers so the communication between your favourite browser and your favourite website online.  Key Security Considerations:  Only support strong protocols. The handshake protocol is an area…

Read more

Detecting data breaches

Posted on 20/08/202104/04/2025 by Farayi Dzichauya

On average how long does it take for a business to detect a data breach? In an IBM study in 2019 which looked at 507 companies and interviewed 3211 individuals in companies that had experienced a data breach in the last year, it identified that the average time to identify a breach in 2019 was…

Read more

Effective security monitoring

Posted on 10/04/202110/04/2021 by Farayi Dzichauya

This week, I stumbled across the NCSC blog post on how to keep your security monitoring effective. This is a topic that is definitely worth revisiting on a regular basis. Far too often I come across instances where security activities sound good but are implemented in a way that causes them to lack the effectiveness…

Read more

The Internet and its building blocks

Posted on 28/03/202128/03/2021 by Farayi Dzichauya

This weekend I was working on a project with my children who wanted to understand how the internet started and I thought would post part of the answers on here as well. The Internet protocol suite resulted from research and development conducted by the Defense Advanced Research Projects Agency (DARPA) in the late 1960s. It’s…

Read more
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next

Newsletter

Hungry for industry insights? Our newsletter delivers bite-sized brilliance straight to your inbox. Discover the trends reshaping tomorrow while sipping your morning coffee today. Experts, insiders, and thought leaders await—just add your email address below.

Recent Posts

  • AI Evolving The Cybersecurity Landscape
  • The Deepfake Arms Race: The Death of “Seeing Is Believing”
  • A Quick Guide to Automating Repetitive Cybersecurity Tasks with Free and Low-Cost AI Tools
  • The Identity Crisis of AI – Why Traditional Security Fails Agentic Systems
  • Who Owns Security? Insights from a panellist at DTX London 2025
  • Communication in Cybersecurity
  • DDOS attacks in the financial sector surging
  • A Wave of Data Breaches – Retail
©2026 Farayi