New contributor
Work experience
JON
Cybersecurity/Content Writer
(
-
Present
)
Areas of Interest
About
JON
David Iyanu Jonathan (JON)
Content & Article Writer | Tech & Business Storyteller
Crafting clear, engaging content that connects ideas to audiences.
Passionate about writing, music, sports & cooking.
Content & Article Writer | Tech & Business Storyteller
Crafting clear, engaging content that connects ideas to audiences.
Passionate about writing, music, sports & cooking.
...see more
Social media links
Analysts with similar expertise
Dana Gardner
Founder and Principal Analyst at Interarbor Solutions
Ryan Raiker
Adjunct Professor at Widener University
Kevin Petrie
Vice President of Research at BARC
Read Supply Chain Security in Modern Software: SBOMs, SLSA, and Beyond
Security
Supply Chain Security in Modern Software: SBOMs, SLSA, and Beyond
7 min
Read Zero Trust in CI/CD Pipelines: Securing Your Software Supply Chain
Security
Zero Trust in CI/CD Pipelines: Securing Your Software Supply Chain
8 min
Read AI-Powered CI/CD: How Machine Learning is Optimizing Build Pipelines
AI
AI-Powered CI/CD: How Machine Learning is Optimizing Build Pipelines
6 min
Read Zero Trust in CI/CD Pipelines: Security from Commit to Deploy
Data
Zero Trust in CI/CD Pipelines: Security from Commit to Deploy
5 min
Read How Internal Developer Portals Are Redefining Developer Experience
Emerging Technologies
How Internal Developer Portals Are Redefining Developer Experience
5 min
Read Platform Engineering Playbooks: Building Internal Developer Portals That Actually Work
Data
Platform Engineering Playbooks: Building Internal Developer Portals That Actually Work
5 min
Read CI/CD Anti-Patterns: What's Slowing Down Your Pipeline?
Data
CI/CD Anti-Patterns: What's Slowing Down Your Pipeline?
5 min
Read AI Governance in the Enterprise: Balancing Innovation with Accountability
AI
AI Governance in the Enterprise: Balancing Innovation with Accountability
4 min
Read The End of Traditional Network Security: Welcome to the Mesh Era
Security
The End of Traditional Network Security: Welcome to the Mesh Era
6 min
Read The Quantum Bomb Nobody Sees Coming
AI
The Quantum Bomb Nobody Sees Coming
5 min
Read JWT: Just Wait 'Til It Breaks — Common Token Mistakes and How to Avoid Them
Security
JWT: Just Wait 'Til It Breaks — Common Token Mistakes and How to Avoid Them
8 min