Farayi

A Cybersecurity Consultant

Menu
  • Home
  • About Me
  • Blog
  • Projects
  • Contact Me
Menu

Blog

Detecting data breaches

Posted on 20/08/202104/04/2025 by Farayi Dzichauya

On average how long does it take for a business to detect a data breach? In an IBM study in 2019 which looked at 507 companies and interviewed 3211 individuals in companies that had experienced a data breach in the last year, it identified that the average time to identify a breach in 2019 was…

Read more

Effective security monitoring

Posted on 10/04/202110/04/2021 by Farayi Dzichauya

This week, I stumbled across the NCSC blog post on how to keep your security monitoring effective. This is a topic that is definitely worth revisiting on a regular basis. Far too often I come across instances where security activities sound good but are implemented in a way that causes them to lack the effectiveness…

Read more

The Internet and its building blocks

Posted on 28/03/202128/03/2021 by Farayi Dzichauya

This weekend I was working on a project with my children who wanted to understand how the internet started and I thought would post part of the answers on here as well. The Internet protocol suite resulted from research and development conducted by the Defense Advanced Research Projects Agency (DARPA) in the late 1960s. It’s…

Read more

A look at the effectiveness of quantitative risk assessment methods in current literature

Posted on 09/03/202101/04/2024 by Farayi Dzichauya

It systems have become very complex due to the prevalence of interconnected systems. As systems have evolved, most enterprise environments have leveraged on the many advantages offered by interconnected systems. This has meant that most businesses are heavily dependent on IT systems to remain operational. The majority of businesses now rely on their IT systems…

Read more

Survey

Posted on 16/03/202004/04/2025 by Farayi Dzichauya

A big thank you to everyone who completed the survey. I will share results in due course.

Read more

first post

Posted on 17/01/202004/04/2025 by Farayi Dzichauya

Hello, world! This is my first blog post in a while and will aim to post on a regular basis. Hope everyone had a good Christmas mine was pretty good and looking forward to the new year.

Read more
  • Previous
  • 1
  • 2
  • 3

Newsletter

Hungry for industry insights? Our newsletter delivers bite-sized brilliance straight to your inbox. Discover the trends reshaping tomorrow while sipping your morning coffee today. Experts, insiders, and thought leaders await—just add your email address below.

Recent Posts

  • Quantum is here: Why Your Business Has Less Than 18 Months to Prepare
  • How can generative ai be used in cybersecurity
  • Leveraging DORA Metrics to Enhance DevSecOps Performance
  • Critical Security Alert for Nginx: Dubbed The Ingress Nightmare Vulnerabilities
  • The Emerging Cyber Threat Landscape: Navigating Unprecedented Digital Risks
  • A Strategic approach to cybersecurity for your business
  • Zero Trust Architecture: The future of cybersecurity
  • Understanding Cybersecurity: Protecting Your Digital World
©2025 Farayi