blancos

Yo, I’m Brian Kimathi, a cybersecurity and IT systems enthusiast from Kenya, passionate about building secure digital environments and improving the world through technology. With over 6 years of hands-on experience in system administration, cybersecurity operations, integrations, mobile money systems and more, I’ve worked on everything from securing backend infrastructures to helping companies respond to real-world cyber threats. My journey has taken me through diverse roles—system administrator at East African Data Handlers, privacy analyst at Techno Brain, senior systems analyst at Bowmans Law and tens of consulting roles.. Along the way, I’ve consulted on projects across the banking, telco, and social impact sectors. I enjoy getting my hands dirty with SecOps tools, system analysis, and threat response frameworks, but what drives me most is helping others understand and embrace the power of secure technology. I hold a Bachelor’s degree in Computer Security and Forensics, certifications in networking and cybersecurity, and I’m currently exploring global opportunities in cybersecurity and infrastructure. This blog is my little corner of the internet where I share security tips and tools, deep dives into IT systems and processes, stories from real-world projects, and mentorship advice for young professionals in tech. If you're into tech, security, or figuring out this digital world you’ll feel right at home here. Let’s connect, learn, and grow together.

written articles

Why Updating Software means Improved Security

Today, where almost everything is digital and connected online, ensuring the security of your personal data and sensitive information is crucial. One of the...

Covering Up Data Breaches is Not the Answer

Organizations can solve this issue by adopting a culture of transparency and accountability, investing in robust security measures, and working with regulatory bodies to establish reporting requirements and protocols for security incidents.

How to Effectively Detect and Respond to a Data Breach

Prevention is key, so be sure to take steps to prevent breaches from occurring in the first place by implementing strong security measures and regularly monitoring your systems for potential threats

Why Lack of MFA adoption by users raises concerns over security

The future is likely to focus less on passwords and more on biometrics and codes. For now, though, MFA is the best way to ensure security for the vast majority of users: It’s easy to use, makes intuitive sense, and is set up across multiple companies and the internet.

Why I think Twitter’s restriction of SMS Authentication is good

SMS based 2-factor authentication is the lesser evil of 2FA. You should consider upgrading your 2FA to use an authenticator app of a security key instead.

Glaze: a Tool to Protect Artists from AI Theft

It makes changes to the artwork, invisible to the human eye. While the artists vs. AI war keeps raging on, those concerned about copyright are looking for ways to eliminate artworks from text-to-image models' training databases. To help, researchers presented Glaze, a tool that can hide art from AI eyes. According to the paper, it [...]

A step-by-step guide to setting up two-factor authentication

Two-factor authentication (2FA), also known as Multi-factor Authentication (MFA), is a security measure that requires two separate ways of proving your identity before accessing...

Raising Digital Natives: Ensuring Child Safety Online

We're living in an age where the Internet has become a basic need. Every household, room, school, public area, waiting spaces, bus station, now...

Why Cybersecurity Awareness in Corporate Spaces Matters and How to Achieve it

In today's digital age, the importance of cybersecurity can hardly be overstated. With the increasing reliance on technology and the internet, companies are more...

How to secure your home network and protect your internet-connected devices

With the rise of the Internet of Things (IoT), an increasing number of devices are connecting to home networks, leaving them vulnerable to cyber...

Explore more

spot_img

Create a website from scratch

With Newspaper Theme you can drag and drop elements onto a page and customize them to perfection. Try it out today and create the perfect site to express yourself!