New contributor
Work experience
JON
Cybersecurity/Content Writer
(
-
Present
)
Areas of Interest
About
JON
David Iyanu Jonathan (JON)
Content & Article Writer | Tech & Business Storyteller
Crafting clear, engaging content that connects ideas to audiences.
Passionate about writing, music, sports & cooking.
Content & Article Writer | Tech & Business Storyteller
Crafting clear, engaging content that connects ideas to audiences.
Passionate about writing, music, sports & cooking.
...see more
Social media links
Analysts with similar expertise
John Santaferraro
Industry Analyst at Ferraro Consulting
Alejandro Leal
Senior Analyst at KuppingerCole Analysts
Dr Joe Perez
Sr Sys Specialist & Team Leader at NC Department of Health & Human Services
Read Supply Chain Security in Modern Software: SBOMs, SLSA, and Beyond
Security
Supply Chain Security in Modern Software: SBOMs, SLSA, and Beyond
7 min
Read Zero Trust in CI/CD Pipelines: Securing Your Software Supply Chain
Security
Zero Trust in CI/CD Pipelines: Securing Your Software Supply Chain
8 min
Read AI-Powered CI/CD: How Machine Learning is Optimizing Build Pipelines
AI
AI-Powered CI/CD: How Machine Learning is Optimizing Build Pipelines
6 min
Read Zero Trust in CI/CD Pipelines: Security from Commit to Deploy
Data
Zero Trust in CI/CD Pipelines: Security from Commit to Deploy
5 min
Read How Internal Developer Portals Are Redefining Developer Experience
Emerging Technologies
How Internal Developer Portals Are Redefining Developer Experience
5 min
Read Platform Engineering Playbooks: Building Internal Developer Portals That Actually Work
Data
Platform Engineering Playbooks: Building Internal Developer Portals That Actually Work
5 min
Read CI/CD Anti-Patterns: What's Slowing Down Your Pipeline?
Data
CI/CD Anti-Patterns: What's Slowing Down Your Pipeline?
5 min
Read AI Governance in the Enterprise: Balancing Innovation with Accountability
AI
AI Governance in the Enterprise: Balancing Innovation with Accountability
4 min
Read The End of Traditional Network Security: Welcome to the Mesh Era
Security
The End of Traditional Network Security: Welcome to the Mesh Era
6 min
Read The Quantum Bomb Nobody Sees Coming
AI
The Quantum Bomb Nobody Sees Coming
5 min
Read JWT: Just Wait 'Til It Breaks — Common Token Mistakes and How to Avoid Them
Security
JWT: Just Wait 'Til It Breaks — Common Token Mistakes and How to Avoid Them
8 min