About Jighi

This author has not yet filled in any details.
So far Jighi has created 47 blog entries.
26 05, 2020

Throw Away Your IT Strategy!

By | May 26th, 2020|Careers, Conference|0 Comments

Office Centricity is Dead. Your Information Technology(IT) implementation and your strategic IT plans were fine until the coronavirus pandemic highlighted their shortcomings. We quickly discovered that most IT implementations lacked persistent secure access from home. Since March, cyber-attacks increased exponentially as a result of work-from-home (WFH) orders. Away from the office, their unsecured digital transactions [...]

23 01, 2019


By | January 23rd, 2019|Conference|0 Comments

Symantec Threat Intelligence researchers have confirmed the suspicious attacks uncovered by Jighi as "real targeted attacks on banks and other financial institutions in several West Africa countries by cyber criminals " employing a range of commodity malware - readily available in cyber underground - and living off the land tools that allow them to hide [...]

3 10, 2017

Insider fraud in the banking industry: What if we could help you prevent, detect and respond to insider fraud?

By | October 3rd, 2017|Conference|0 Comments

An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, institution, or agency. The term can also apply to an outside person who poses as an employee or officer by obtaining false credentials. The hacker obtains access to the computer systems [...]

9 09, 2016

Wi-Fi / WLAN Channels, Frequencies, Bands & Bandwidths

By | September 9th, 2016|Tech Reference|0 Comments

Wi-Fi / WLAN / 802.11 channels, their channel frequencies and bandwidth allocations around the globe, spectral mask and summary of which channels can be used together for WLAN solutions. The IEEE 802.11 Wi-Fi / WLAN standards set the attributes for the different channels that may be used. These attributes enable different Wi-Fi modules to talk [...]

7 12, 2015

RADIUS Security and Best Practices

By | December 7th, 2015|Tech Reference|0 Comments

Remote Authentication Dial-In User Service (RADIUS) is commonly used to provide centralized authentication, authorization, and accounting for dial-up, virtual private network, and, more recently, wireless network access. This article provides an overview of RADIUS and the Extensible Authentication Protocol (EAP) and discusses how to minimize or resolve various security issues of the RADIUS protocol using [...]