
New contributor
Work experience
JON
Cybersecurity/Content Writer
(
-
Present
)
Areas of Interest
About
JON
David Iyanu Jonathan (JON)
Content & Article Writer | Tech & Business Storyteller
Crafting clear, engaging content that connects ideas to audiences.
Passionate about writing, music, sports & cooking.
Content & Article Writer | Tech & Business Storyteller
Crafting clear, engaging content that connects ideas to audiences.
Passionate about writing, music, sports & cooking.
...see more
Social media links
Analysts with similar expertise

Alejandro Leal
Senior Analyst at KuppingerCole Analysts

Barry Flack
CEO at BF Consultancy

Dana Gardner
Founder and Principal Analyst at Interarbor Solutions
Read Supply Chain Security in Modern Software: SBOMs, SLSA, and Beyond

Security
Supply Chain Security in Modern Software: SBOMs, SLSA, and Beyond
7 min
Read Zero Trust in CI/CD Pipelines: Securing Your Software Supply Chain

Security
Zero Trust in CI/CD Pipelines: Securing Your Software Supply Chain
8 min
Read AI-Powered CI/CD: How Machine Learning is Optimizing Build Pipelines

AI
AI-Powered CI/CD: How Machine Learning is Optimizing Build Pipelines
6 min
Read Zero Trust in CI/CD Pipelines: Security from Commit to Deploy

Data
Zero Trust in CI/CD Pipelines: Security from Commit to Deploy
5 min
Read How Internal Developer Portals Are Redefining Developer Experience

Emerging Technologies
How Internal Developer Portals Are Redefining Developer Experience
5 min
Read Platform Engineering Playbooks: Building Internal Developer Portals That Actually Work

Data
Platform Engineering Playbooks: Building Internal Developer Portals That Actually Work
5 min
Read CI/CD Anti-Patterns: What's Slowing Down Your Pipeline?

Data
CI/CD Anti-Patterns: What's Slowing Down Your Pipeline?
5 min
Read AI Governance in the Enterprise: Balancing Innovation with Accountability

AI
AI Governance in the Enterprise: Balancing Innovation with Accountability
4 min
Read The End of Traditional Network Security: Welcome to the Mesh Era

Security
The End of Traditional Network Security: Welcome to the Mesh Era
6 min
Read The Quantum Bomb Nobody Sees Coming

AI
The Quantum Bomb Nobody Sees Coming
5 min
Read JWT: Just Wait 'Til It Breaks — Common Token Mistakes and How to Avoid Them

Security
JWT: Just Wait 'Til It Breaks — Common Token Mistakes and How to Avoid Them
8 min