Farayi

A Cybersecurity Consultant

Menu
  • Home
  • About Me
  • Frameworks
  • Blog
  • Projects
  • Contact Me
Menu

Category: Uncategorized

A Quick Guide to Automating Repetitive Cybersecurity Tasks with Free and Low-Cost AI Tools

Posted on 15/12/202515/12/2025 by Farayi Dzichauya

Cybersecurity professionals have many essential tasks that are repetitive, time-consuming, and prone to human error. These often include drafting routine communications, scheduling security awareness sessions, and performing basic data entry to maintain compliance and inventory. While dedicated Security Orchestration, Automation, and Response (SOAR) platforms are powerful, they are often cost-prohibitive for smaller teams or individual…

Read more

The Identity Crisis of AI – Why Traditional Security Fails Agentic Systems

Posted on 29/11/202529/11/2025 by Farayi Dzichauya

The rise of autonomous AI agents is transforming business and also exposing a critical flaw in our digital security ecosystem. Our identity and access management systems are reaching their limitations. Protocols like OAuth and SAML were built for human users and static applications. They rely on one-time authentication and fixed permissions, a model that simply…

Read more

Who Owns Security? Insights from a panellist at DTX London 2025

Posted on 04/10/202520/10/2025 by Farayi Dzichauya

“Whose responsibility is security?” This question dominated the conversation at DTX London 2025’s Agile stage. I was a panellist discussing this topic at DTX this week. The unanimous answer: security is everyone’s responsibility—not just the CISO’s or the security team’s. Speed vs. Security As development cycles shrink to days or hours, security vulnerabilities are becoming…

Read more

Communication in Cybersecurity

Posted on 27/06/202527/06/2025 by Farayi Dzichauya

This week, I attended a Toastmasters event and witnessed what is arguably the best public speaking I have heard this year. This was an interesting session; it caused me to reflect on my communication style and the broader cybersecurity fraternity. Are we communicating clearly?  There has been a few interesting cybersecurity articles that have either…

Read more

Who doesn’t want to write secure code?

Posted on 28/03/202204/04/2025 by Farayi Dzichauya

Software engineers typically make hundreds of decisions every day and in my experience no one sets out to write insecure code, so everyone is well meaning however in those decisions some have a bearing on security outcomes and some don’t. It is vital that developers spot security-relevant decisions as they are encountered, and have a clear…

Read more

Effective security monitoring

Posted on 10/04/202110/04/2021 by Farayi Dzichauya

This week, I stumbled across the NCSC blog post on how to keep your security monitoring effective. This is a topic that is definitely worth revisiting on a regular basis. Far too often I come across instances where security activities sound good but are implemented in a way that causes them to lack the effectiveness…

Read more

The Internet and its building blocks

Posted on 28/03/202128/03/2021 by Farayi Dzichauya

This weekend I was working on a project with my children who wanted to understand how the internet started and I thought would post part of the answers on here as well. The Internet protocol suite resulted from research and development conducted by the Defense Advanced Research Projects Agency (DARPA) in the late 1960s. It’s…

Read more

A look at the effectiveness of quantitative risk assessment methods in current literature

Posted on 09/03/202101/04/2024 by Farayi Dzichauya

It systems have become very complex due to the prevalence of interconnected systems. As systems have evolved, most enterprise environments have leveraged on the many advantages offered by interconnected systems. This has meant that most businesses are heavily dependent on IT systems to remain operational. The majority of businesses now rely on their IT systems…

Read more

Survey

Posted on 16/03/202004/04/2025 by Farayi Dzichauya

A big thank you to everyone who completed the survey. I will share results in due course.

Read more

first post

Posted on 17/01/202004/04/2025 by Farayi Dzichauya

Hello, world! This is my first blog post in a while and will aim to post on a regular basis. Hope everyone had a good Christmas mine was pretty good and looking forward to the new year.

Read more

Newsletter

Hungry for industry insights? Our newsletter delivers bite-sized brilliance straight to your inbox. Discover the trends reshaping tomorrow while sipping your morning coffee today. Experts, insiders, and thought leaders await—just add your email address below.

Recent Posts

  • A Quick Guide to Automating Repetitive Cybersecurity Tasks with Free and Low-Cost AI Tools
  • The Identity Crisis of AI – Why Traditional Security Fails Agentic Systems
  • Who Owns Security? Insights from a panellist at DTX London 2025
  • Communication in Cybersecurity
  • DDOS attacks in the financial sector surging
  • A Wave of Data Breaches – Retail
  • Quantum is here: Why Your Business Has Less Than 18 Months to Prepare
  • How can generative ai be used in cybersecurity
©2026 Farayi