Amakiri Welekwe

Amakiri Welekwe

Amakiri is a UK-trained technology consultant and cybersecurity evangelist, working at the intersection of security, technology, and people. He has a master’s degree in network systems with over 10 years’ experience in managing IT services and infrastructure. He’s been writing about cybersecurity since 2013.

Articles by Amakiri

If Zabbix is not best suited for your environment and you’re considering a suitable alternative, we’ve put together a list of the best Zabbix Alternatives to guide you in the process of selecting the right one for your business
By Amakiri Welekwe in Net Admin on July 23, 2024
Jitter and call quality issues can hamper your business communication if you don't take proactive steps to minimize them. In this article, we will take a look at some of the best jitter and VoIP quality testing tools to help you deal with common issues associated with VoIP systems. 
By Amakiri Welekwe in Net Admin on September 16, 2024
There are lots of online port scanning applications out there that you can use to scan your network. In this article, we’re going to review the best out there.  Hopefully, this will guide you in the process of selecting the right one for your port scanning needs. 
By Amakiri Welekwe in Net Admin on January 8, 2025
GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens. Non-compliance to the provisions of the regulations attracts severe penalties. To help you fully comprehend the provisions of the GDPR document and prepare your business for compliance, we have put together a list of 25 GDPR key definitions that you need to know.
By Amakiri Welekwe in Data Privacy Management on March 11, 2025
Learn how you can use the ping command to determine Maximum Transmission Unit (MTU) size
By Amakiri Welekwe in Net Admin on November 18, 2024
Discover how you can use security testing as a strategy to identify and fix security gaps, including the best techniques and tools available. 
By Amakiri Welekwe in Net Admin on January 22, 2025
We show you how to use access control list (ACL) to enforce IT security policies in your organization. 
By Amakiri Welekwe in Net Admin on November 25, 2024
Discover what WinRM protocol is all about and gain insight on how you can use it to manage your network
By Amakiri Welekwe in Net Admin on November 19, 2024
Discover what MQTT protocol is all about and find out how it's used in real-world IoT applications
By Amakiri Welekwe in Net Admin on December 4, 2024
Page 24 of 28