In an era where cyber threats are escalating, understanding what constitutes a secure password is crucial. Recent studies reveal that a 5-character password using numbers and mixed-case letters can be cracked in just 2 hours, while an 18-character password with uppercase and lowercase letters, symbols, and numbers could take forever to break. Whever you can, follow the NIST SP 800-63B digital identity guidelines.
Gul Zaman Ilyas
Accomplished IT professional with over 25+ years of diverse experience across multinational and multicultural international settings. My professional journey began as a Software Engineer and has evolved through roles such as Software Solutions Developer, Infrastructure Manager, IT Manager, and IT Project Manager. Embracing the evolution of technology and methodologies, I transitioned from traditional project management to Agile project management.
Thursday, May 1, 2025
Friday, April 18, 2025
A2A: The Protocol Powering the Future of AI Collaboration
Picture this:
It’s 2025, and your AI assistant isn’t just booking your flights or scheduling meetings—it’s teaming up with other AI agents to tackle your entire workday. One agent sifts through your emails, another analyzes your sales data, and a third drafts a report, all while chatting seamlessly with each other. No human intervention, no clunky integrations—just pure, efficient collaboration. Sounds like sci-fi? Not anymore. Enter A2A (Agent to Agent), the protocol that’s about to revolutionize how AI systems work together. And trust me, it’s a game-changer. 🚀
Wednesday, April 16, 2025
2025 Cybersecurity Vibes: AI’s Epic Moves and How to Stay Safe
Hey there! We welcomed 2025 with lot's of happenings, where the internet’s like a massive amusement park—thrilling rides, but a few sneaky pickpockets. Artificial intelligence (AI) is the star of the show, pulling off some jaw-dropping tricks, both cool and kinda scary.
Don’t worry—I’m breaking it down super simply, with real-life stories to keep it fun, so everyone gets what’s up. This is a quick peek at the hot cybersecurity topics we’ll dive deeper into later with full articles. Ready? Let’s roll!
Monday, April 14, 2025
Boosting Brand Trust with BIMI
Completed our email security series, let's explore Brand Indicators for Message Identification (BIMI), which enhances brand recognition and trust in email inboxes.
Sunday, April 13, 2025
Summary of Email Security Series Articles
Here is the quick summary of all the articles I wrote in the "Email Security Series"
Email Security Series Article 1:
Securing Emails in Transit with TLS 1.3
The TLS 1.3 article highlights its role in encrypting email traffic between mail servers, ensuring confidentiality and integrity. It explains how the protocol streamlines the handshake process, eliminates outdated algorithms (like RSA and SHA-1), and supports forward secrecy by default. Key benefits include improved performance, stronger encryption, and resistance to downgrade attacks. The article includes a visual flow of a secured SMTP session and practical tips for enabling TLS 1.3.
Featured Post
🔐 Which Password Is Considered Secure? Why It Matters More Than Ever in 2025
In an era where cyber threats are escalating, understanding what constitutes a secure password is crucial. Recent studies reveal that a 5-...

Popular Posts
-
Urgent-Important Matrix: Using a simple grid, it defines tasks according to their importance and urgency: Quadrant 1 - URGENT and IMPORTANT ...
-
How do you know which product backlog item to work on next? Product backlog prioritization is not an exact science. What works for someone ...
-
Product Owner The Product Owner is accountable for maximizing the value of the product resulting from the work of the Scrum Team. How this...
-
SCRUM GUIDE 2020 Release Summary Here is what's changed and new in SCRUM Guide 2020
-
Jeff Sutherland and Ken Schwaber conceived the scrum process in the early 1990s. The term came from rugby and referred to a team working to...
-
Over the past few years Software Development have gone through some major changes including applications being moved to cloud and DevOp...
-
Motivate talented professionals to focus on their career/life development Looking for Personal / Professional development for self or team m...
-
“A Coach has some great questions for your answers whereas a Mentor has some great answers for your questions”
-
You want to develop raw talent with a specific new skill or enhance the experienced professional with a new or refreshed skill You are not m...
-
In today's digital age, email remains a critical communication tool for businesses and individuals alike. However, with its widespread u...