Amakiri Welekwe

Amakiri Welekwe

Amakiri is a UK-trained technology consultant and cybersecurity evangelist, working at the intersection of security, technology, and people. He has a master’s degree in network systems with over 10 years’ experience in managing IT services and infrastructure. He’s been writing about cybersecurity since 2013.

Articles by Amakiri

With a variety of ZTNA solutions now available, choosing the right one for your organization and budget can be challenging. We show you the best zero-trust networking software solutions.
By Amakiri Welekwe in Net Admin on June 18, 2024
The ultimate guide to Traditional Inter-VLAN Routing, Router-on-a-Stick Inter-VLAN Routing, and Multilayer Switch Inter-VLAN Routing
By Amakiri Welekwe in Net Admin on November 13, 2024
Discover what Multi-User Multiple-Input and Multiple-Output (MU-MIMO) is and how this technology works. We show you how MU-MIMO keeps you connected.
By Amakiri Welekwe in Net Admin on October 5, 2020
We explain how BGP selects the best path to destinations based on a list of attributes. We also look at the code involved and provide explanatory diagrams and tables.
By Amakiri Welekwe in Net Admin on January 31, 2022
Thinking of selling or recycling your iPhone? It's important to make sure you wipe all of your personal data and information. We explain how to wipe an iPhone completely, before selling it.
By Amakiri Welekwe in VPN & Privacy on August 10, 2023
Thinking of selling or recycling your Android device? Make sure to delete your data so you're not handing personal information to a stranger. We explain how to wipe an Android phone or tablet fully.
By Amakiri Welekwe in VPN & Privacy on January 26, 2024
Many cyber attacks exploit buffer overflow vulnerabilities to compromise target applications or systems. Here's is what you need to know, and what you can do to secure your applications. 
By Amakiri Welekwe in Information Security on September 27, 2023
Immunity passports may seem like a natural fit at this time, but we have a duty to ensure that the underlying technology does not undermine our privacy rights and individual freedoms.
By Amakiri Welekwe in Information Security on August 14, 2020
Fraudsters often use emails, texts, phone calls, and pretexting scenarios to extract sensitive information. We reveal everything you need to know about pretexting attacks including examples and how to defend yourself.
By Amakiri Welekwe in Information Security on January 8, 2024
Page 23 of 24