Open in app
Home
Notifications
Lists
Stories

Write
Celestin Ntemngwa
Celestin Ntemngwa

Home

Oct 29, 2021

Wireless Hacking with WifiPhisher

Suppose you need to get a Wi-Fi password but don’t have the time to crack it if you need to clone a wireless access point and trick users into connecting to your rogue network. …

Hacking

6 min read

Wireless Hacking with WifiPhisher
Wireless Hacking with WifiPhisher

Aug 24, 2021

How to Assess and Audit DevOps Security to Improve Business Value

How to Assess and Audit DevOps Security to Improve Business Value The ISACA guidelines for auditing DevOps recognize the potential business value of DevOps, but they stress that there are assurance, governance, and security factors to consider. “ This guidance outlines these considerations: the risks associated with DevOps (in both…

Dev Ops

20 min read

How to Assess and Audit DevOps Security to Improve Business Value
How to Assess and Audit DevOps Security to Improve Business Value

Aug 24, 2021

The Business Value of DevOps

The Business Value of DevOps As the Agile Manifesto states, “We are uncovering better ways of developing software by doing it and helping others do it.” By using DevOps practices, you can measure the impact on business performance. …

6 min read

The Business Value of DevOps
The Business Value of DevOps

Jun 19, 2021

Supervised Machine Learning with Python Scikit Learn(sklearn) in Four Lines of Code

Supervised Machine Learning with Python Scikit Learn(sklearn) in Four Lines of Code Machine Learning(ML) consists of developing a mathematical model from an experimental dataset. Three techniques are used to create a model: supervised learning, unsupervised learning, and reinforcement learning. This article focuses on supervised learning, which is the most common…

Machine Learning

5 min read

Supervised Machine Learning with Python Scikit Learn(sklearn) in Four Lines of Code
Supervised Machine Learning with Python Scikit Learn(sklearn) in Four Lines of Code

Feb 16, 2021

Data as Power Source for Artificial Intelligence(AI)

Let us begin by looking at the jargon for data. A bit (binary digit) is the smallest form of data in computer science. It is thought of as an atom. A bit can be 0 or 1. It is typically used to measure the amount of data transmitted from one…

Data Science

6 min read

Data as Power Source for Artificial Intelligence(AI)
Data as Power Source for Artificial Intelligence(AI)

Feb 3, 2021

AI Audit plan leveraging ISO27001 to meet GDPR Compliance

IT auditors face potential challenges in auditing AI. There some solutions that can convert these challenges into successes. In this paper, the author discusses an audit plan for AI audit that leverages ISO27001 to meet GDPR Article 22 compliance. Impact of AI in organizations Organizations are incorporating into most of…

Gdpr

6 min read

AI Audit plan leveraging ISO27001 to meet GDPR Compliance
AI Audit plan leveraging ISO27001 to meet GDPR Compliance

Feb 3, 2021

Automate Incident Management with Code

An incident in a production environment is never a good thing to deal with. However, those things happen. Even though not very common. Once it happens, you have to be ready for it. Better planning is key to handling incidents. What if a support model includes a prompt for the…

Programming

3 min read

Automate Incident Management with Code
Automate Incident Management with Code

Jan 14, 2021

Analyzing a System using PowerShell

Analyzing a System using PowerShell Analyzing a System using PowerShell This project involved using PowerShell to analyze a system. I collected information about a system and did some analysis of the data collected. …

Cybersecurity

5 min read

Analyzing a System using PowerShell
Analyzing a System using PowerShell

Dec 18, 2020

A/B Testing

A/B testing is a method of testing that compares the performance of two or more product or service versions A and B, and so on. The most effective A/B testing scenarios are designed to test one main variable (X, Y, count, color, completion rate, etc.). The testing monitors one or…

2 min read

A/B Testing
A/B Testing

Aug 2, 2020

Recommended security Improvements for operating systems to ensure better security and compliance

Computer system resources include CPU, memory, disk, software programs, and data/information stored in the computer system. The operating system’s processes (the process is a program in execution) and kernel do the designated task as instructed. A user’s program can make these processes do different jobs. These processes utilize the resources…

Cybersecurity

5 min read

Recommended security Improvements for operating systems to ensure better security and compliance
Recommended security Improvements for operating systems to ensure better security and compliance
Celestin Ntemngwa

Celestin Ntemngwa

Following
  • Santiago Valdarrama

    Santiago Valdarrama

  • World Economic Forum

    World Economic Forum

  • Tenable

    Tenable

  • freeCodeCamp

    freeCodeCamp

  • Google Cloud

    Google Cloud

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable