Stay updated with Dr. Mushfiq's latest thoughts, research insights, and academic contributions.
30 Dec, 2025
Securing the Digital Perimeter: A Holistic Approach Through the CISA and CRISC Certifications
In todayâs connected digital world, network security stands as the foundation of organizational resilience. As businesses move deeper into digital transformation, securing the underlying network infrastructure is no longer optionalâit is a strategic...
Read more
03 Sep, 2024
Emerging Technology: Key Challenges and Opportunities
In this article, I will explore the multifaceted influence of emerging technologies on diverse aspects of human experience, encompassing personal, societal, organizational and national levels. These technological advancements are fundamentally reshap...
Read more
02 Sep, 2024
āĻļāĻŋāĻļā§ āĻ āύāĻžāϰā§āĻĻā§āϰ āĻŦāĻŋāϰā§āĻĻā§āϧ⧠āϏāĻžāĻāĻŦāĻžāϰ āĻ āĻĒāϰāĻžāϧ āĻŦāύā§āϧ⧠āĻāĻžāϰā§āϝāĻāϰ āĻāĻĻā§āϝā§āĻ āύāĻŋāύ
āϏāĻžāĻāĻŦāĻžāϰ āĻāĻā§āϰāĻŽāĻŖ āϏāĻŽāĻžāĻā§āϰ āĻāĻĒāϰ āĻāĻā§āϰ āĻĒā§āϰāĻāĻžāĻŦ āĻĢā§āϞāĻā§, āϝāĻžāϰ āĻĢāϞ⧠āĻŦāĻŋāĻāĻŋāύā§āύ āϧāϰāύā§āϰ āĻĄāĻŋāĻāĻŋāĻāĻžāϞ āĻāĻā§āϰāĻŽāĻŖā§āϰ āĻšā§āĻŽāĻāĻŋ āĻĨā§āĻā§ āύāĻžāĻāϰāĻŋāĻāĻĻā§āϰ āϏā§āϰāĻā§āώāĻž āĻĻā§āĻā§āĻžāϰ āĻāύā§āϝ āĻĻā§ā§ āĻĒā§āϰāϤāĻŋāĻāĻžāϰā§āϰ āĻĒā§āϰā§ā§āĻāύāĨ¤ āĻļāĻŋāĻļā§ āĻāĻŦāĻ āύāĻžāϰā§āĻĻā§āϰ āĻĒā§āϰāĻāĻžāĻŦāĻŋāϤ āĻāϰ⧠āĻāĻŽāύ āύāĻŋāϰā§āĻĻāĻŋāώā§āĻ āϏāĻžāĻāĻŦāĻžāϰ āĻāĻā§āϰāĻŽāĻŖ āĻāĻŦāĻ āĻāĻ āĻāĻā§āϰāĻŽāĻŖā§āϰ āĻā§āĻāĻāĻŋāĻā§āϞāĻŋ āĻšā§āϰāĻžāϏ āĻāϰāϤ⧠āĻāĻžāϰā§āϝāĻāϰ...
Read more
15 Aug, 2024
āϏāĻŽāĻžāĻā§āϰ āĻāύā§āύā§āύ⧠āĻĒā§āϰāϝā§āĻā§āϤāĻŋāϰ āĻŦā§āϝāĻŦāĻšāĻžāϰ⧠āĻĒā§āϰā§ā§āĻāύ āĻĒā§āĻļāĻžāĻā§āĻŦā§āĻĻā§āϰ āĻ āĻā§āϰāĻŖā§ āĻā§āĻŽāĻŋāĻāĻž
āĻŦāĻžāĻāϞāĻžāĻĻā§āĻļ āĻŦāϰā§āϤāĻŽāĻžāύ⧠āĻŦā§āϞāĻāĻā§āĻāύ, āĻāĻāĻāĻāĻŋ, āĻā§āϞāĻžāĻāĻĄ āĻāĻŽā§āĻĒāĻŋāĻāĻāĻŋāĻ āĻ āĻā§āϤā§āϰāĻŋāĻŽ āĻŦā§āĻĻā§āϧāĻŋāĻŽāϤā§āϤāĻžāϰ āĻŽāϤ⧠āĻāĻĻā§ā§āĻŽāĻžāύ āĻĒā§āϰāϝā§āĻā§āϤāĻŋāĻā§āϞāĻŋāĻā§ āĻā§āϰāĻšāĻŖā§āϰ āĻĻāĻŋāĻā§ āĻŽāύā§āύāĻŋāĻŦā§āĻļ āĻāϰā§āĻā§āĨ¤ āĻāĻ āĻĒā§āϰāϝā§āĻā§āϤāĻŋāĻāϤ āĻ āĻā§āϰāĻāϤāĻŋ āĻĻā§āĻļāĻā§ āĻāϤā§āϰā§āĻĨ āĻ āĻĒāĻā§āĻāĻŽ āĻļāĻŋāϞā§āĻĒ āĻŦāĻŋāĻĒā§āϞāĻŦā§āϰ āĻĻāĻŋāĻā§ āĻāĻāĻŋā§ā§ āύā§āĻā§āĻžāϰ āϞāĻā§āώā§āϝā§āĨ¤ āĻāĻ āύāϤā§āύ āĻĒā§āϰāϝā§āĻā§āϤāĻŋāĻā§āϞāĻŋ āĻŦāĻŋāĻāĻŋāύā§āύ āĻā§...
Read more
13 Jul, 2024
āĻā§āĻāϏāĻ āĻāύā§āύā§āύ āĻ āύāĻŋāϰāĻžāĻĒāϤā§āϤāĻžāϰ āĻāύā§āϝ āĻĻā§āĻļā§ā§ āĻĒā§āϰāϝā§āĻā§āϤāĻŋāϰ āĻāĻĻā§āĻāĻžāĻŦāύ āĻ āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻāϰā§āϰāĻŋ
⧍ā§Ļā§Ēā§§ āϏāĻžāϞ⧠āĻŦāĻžāĻāϞāĻžāĻĻā§āĻļāĻā§ āĻāĻāĻāĻŋ āĻāύā§āύāϤ āĻ āϏā§āĻŽāĻžāϰā§āĻ āĻĻā§āĻļā§ āĻĒāϰāĻŋāĻŖāϤ āĻāϰāĻžāϰ āϞāĻā§āώā§āϝ⧠āϏāϰāĻāĻžāϰ "āϰā§āĻĒāĻāϞā§āĻĒ ā§¨ā§Ļā§Ēā§§" āύāĻžāĻŽā§ āĻāĻāĻāĻŋ āĻĻā§āϰā§āĻāĻŽā§ā§āĻžāĻĻā§ āĻĒāϰāĻŋāĻāϞā§āĻĒāύāĻž āĻā§āϰāĻšāĻŖ āĻāϰā§āĻā§āĨ¤ āĻāĻ āĻĒāϰāĻŋāĻāϞā§āĻĒāύāĻžāϰ āĻāĻāĻāĻŋ āĻā§āϰā§āϤā§āĻŦāĻĒā§āϰā§āĻŖ āĻĻāĻŋāĻ āĻšāϞ⧠āĻĻā§āĻļā§ā§ āĻĒā§āϰāϝā§āĻā§āϤāĻŋāϰ āĻāĻĻā§āĻāĻžāĻŦāύ āĻ āĻŦā§āϝāĻŦāĻšāĻžāϰāĨ¤ āĻā§āĻāϏāĻ āĻāύā§āύā§āύ āĻ āύāĻŋāϰāĻžāĻĒāϤā§āϤāĻž āĻ āϰā§āĻāύ⧠āĻāϰ āĻā§āĻŽāĻŋāĻāĻž...
Read more
29 Jun, 2024
āĻŽāĻžāĻĨāĻžāĻāĻžā§āĻž āĻĻāĻŋāĻā§āĻā§ āύāĻŋāϤā§āϝāύāϤā§āύ āϏāĻžāĻāĻŦāĻžāϰ āĻ āĻĒāϰāĻžāϧ: āϏāĻŋāĻā§āϝāĻžāĻĢā§āϰ āĻāĻŦā§āώāĻŖāĻž
āĻĻā§āĻļā§ āĻĻā§āĻŦāĻŋāĻā§āĻŖ āĻšāĻžāϰ⧠āĻŦāĻžā§āĻā§ āϏāĻžāĻāĻŦāĻžāϰ āĻ āĻĒāϰāĻžāϧā§āϰ āύāϤā§āύ āĻŽāĻžāϤā§āϰāĻžāĨ¤ āĻŦā§āϝāĻā§āϤāĻŋāĻāϤ āĻā§āώāϤāĻŋāϰ āĻĒāĻžāĻļāĻžāĻĒāĻžāĻļāĻŋ āĻāϰā§āĻĨāĻŋāĻ āĻā§āώāϤāĻŋ āĻāĻŦāĻ āĻĒā§āϰāϞā§āĻāύ⧠āĻĒā§āϰāĻāĻ āϏāĻžāĻāĻŦāĻžāϰ āĻ āĻĒāϰāĻžāϧāĨ¤ āϤāĻŦā§ āϏāĻžāĻŽāĻžāĻāĻŋāĻ āϞā§āĻāϞāĻā§āĻāĻžāϰ āĻā§āϝāĻžāĻŦā§āϤ⧠āϤāĻž āĻĨāĻžāĻāĻā§ āĻ āύā§āϤāϰāĻžāϞā§āĻāĨ¤ āϤāĻžāĻ āĻāĻŖ-āϏāĻžāĻāĻŦāĻžāϰ āϏāĻžāĻā§āώāϰāϤāĻžāϰ āĻĒāĻžāĻļāĻžāĻĒāĻžāĻļāĻŋ āĻĻā§āĻļā§āϰ āϏāĻžāĻāĻŦāĻžāϰ āϏāĻžāϰā§āĻŦāĻā§āĻŽāϤā§āĻŦ āĻ āĻā§āώā§āĻŖā§āĻŖ āϰāĻžāĻāϤ⧠āϏāϰ...
Read more
23 Sep, 2023
āĻ āĻā§āĻā§āĻŦāϰāĻā§ āĻāĻžāϤā§ā§ āϏāĻžāĻāĻŦāĻžāϰ āύāĻŋāϰāĻžāĻĒāϤā§āϤāĻž āϏāĻā§āϤāύāϤāĻž āĻŽāĻžāϏ āĻā§āώāĻŖāĻžāϰ āĻĻāĻžāĻŦāĻŋ, āĻļā§āϰ⧠āĻšāĻā§āĻā§ āĻŽāĻžāϏāĻŦā§āϝāĻžāĻĒā§ āĻāϰā§āĻŽāϏā§āĻāĻŋ
âāĻāĻŽāĻžāĻĻā§āϰ āĻŦāĻŋāĻļā§āĻŦāĻā§ āϏā§āϰāĻā§āώāĻŋāϤ āĻāϰāĻŋâ- āĻāĻ āĻĒā§āϰāϤāĻŋāĻĒāĻžāĻĻā§āϝ⧠āĻŽāĻžāϏāĻā§ā§ā§ āϏāĻžāϰāĻžāĻĻā§āĻļā§ āĻļā§āϰ⧠āĻšāϤ⧠āϝāĻžāĻā§āĻā§ āĻ āώā§āĻāĻŽ āϏāĻžāĻāĻŦāĻžāϰ āύāĻŋāϰāĻžāĻĒāϤā§āϤāĻž āϏāĻā§āϤāύāϤāĻž āĻŽāĻžāϏ (āĻā§āϝāĻžāĻŽ) āĻ āĻā§āĻā§āĻŦāϰā§āϰ āĻāϰā§āĻŽāϏā§āĻāĻŋāĨ¤ āĻŦāĻŋāĻāĻŋāύā§āύ āĻĻā§āĻļā§āϰ āĻŽāϤ⧠āĻŦāĻžāĻāϞāĻžāĻĻā§āĻļā§āĻ āĻ āĻā§āĻā§āĻŦāϰāĻā§ âāĻāĻžāϤā§ā§ āϏāĻžāĻāĻŦāĻžāϰ āύāĻŋāϰāĻžāĻĒāϤā§āϤāĻž āϏāĻā§āϤāύāϤāĻž āĻŽāĻžāϏâ āĻā§āώāĻŖāĻž āĻāϰāϤ⧠āϏāϰāĻāĻžāϰā§āϰ āĻĒā§āϰāϤāĻŋ āĻĻāĻžāĻŦāĻŋ āĻāĻž...
Read more
30 Jul, 2023
āĻĄāĻžāĻāĻž āĻĒā§āϰāĻžāĻāĻā§āϏāĻŋ āĻāĻāύ āĻĒā§āϰāĻŖā§āύ āĻ āĻĒā§āϰāϝā§āĻā§āϤāĻŋāĻāϤ āϏāĻā§āώāĻŽāϤāĻž āĻŦāĻžā§āĻžāύā§āϰ āĻĒāϰāĻžāĻŽāϰā§āĻļ āĻŦāĻŋāĻļā§āώāĻā§āĻāĻĻā§āϰ
'āĻĻā§āĻļā§ āĻĄāĻžāĻāĻž āĻĒā§āϰāĻžāĻāĻā§āϏāĻŋ āĻāĻŦāĻ āĻĄāĻžāĻāĻž āϏāĻŋāĻāĻŋāĻāϰāĻŋāĻāĻŋ āĻāĻāύ āύā§āĻ⧎ āĻĄāĻžāĻāĻž āĻāϰā§āĻāύā§āύā§āϏ āĻā§āĻŦāĻ āĻā§āϰā§āϤā§āĻŦāĻĒā§āϰā§āĻŖāĨ¤ āĻĄāĻžāĻāĻž āĻĒāϞāĻŋāϏāĻŋāϤ⧠āĻā§ āĻĄāĻžāĻāĻž āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻāϰāĻŦā§, āĻā§āĻāĻžāĻŦā§ āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻāϰāĻŦā§ āĻāĻŦāĻ āĻāϤāĻā§āĻā§ āĻĄāĻžāĻāĻž āĻŦā§āϝāĻŦāĻšāĻžāϰ āĻāϰāĻŦā§ āϤāĻž āϏā§āύāĻŋāĻļā§āĻāĻŋāϤ āϏāϰāĻāĻžāϰāĻā§āĻ āĻāϰāϤ⧠āĻšā§ā§ˇ āĻĢāϞ⧠āĻĻā§āĻļā§ āĻĄāĻžāĻāĻž āĻĒā§āϰāĻžāĻāĻā§āϏāĻŋ āĻāĻŦāĻ āĻĒā§āϰāĻā§āĻāĻļāύ āĻāĻāύ āĻāϰāĻž āĻāϰā§āϰāĻŋāĨ¤â...
Read more
09 Feb, 2021
Essential Cybersecurity Components: Continuous Monitoring, Human Intelligence and Commitment
Continuous monitoring is essential in the cybersecurity ecosystem of an organization. Proper design, implementation and continuous monitoring provide just-in-time reflection of users, devices, networks, data, workloads activities and status in the or...
Read more
07 Jan, 2021
Threat Hunting and Cyberrisk Assessment Using Cyber Kill Chain
Virtually every organization needs to provide digital services to its clients. However, digitization creates enormous threats for an organization, its customers and its employees. To address these threats, organizations must implement cybersecurity s...
Read more
06 Jan, 2021
Security and Risk Assessment of IT Defense Strategies Considering the Cyber Kill Chain
Defensive IT architecture helps to deploy defense-in-depth concepts in an organizationâs IT architecture, which helps to prevent, identify, detect, contain, respond to and recover from cyberincidents in a timely manner. Defensive architecture in info...
Read more
30 Jul, 2020
#IamISACA: Overcoming Challenges By Always Learning New Things
I have faced many challenges in my career in project management when implementing technology projects, including the last couple of years working on implementations of cybersecurity frameworks, standards and regulatory requirements to achieve good IT...
Read more
01 Jul, 2015
Auditing Linux/Unix Server Operating Systems
Server auditing is an important task to ensure platform-level security in an IT infrastructure and to ensure the proper configuration of Linux server security. The Linux system has its own security configuration and management system to address the s...
Read more
01 Nov, 2014
Auditing Oracle Database
Database auditing is the activity of monitoring and recording configured database actions from database users and nondatabase users, to ensure the security of the databases. An administrator can perform auditing on individual actions, such as the ty...
Read more