Want to learn more about cybersecurity? Click on the button at the right side to Watch Dr Ikhalia's Webinars
Meet Dr Ikhalia
Dr Joseph E. Ikhalia is a Senior Cyber Security Engineer at Riela Cybersecurity Centre Limited and played a lead role in the ISO 27001 accreditation of The Riela Group of companies. He previously worked as IT Security Manager of the world's first fully licensed Blockchain lottery - Quanta. Helping them develop, implement and maintain a robust cybersecurity strategy from concept to go-live and beyond.
An expert in designing, implementing, and improving cybersecurity architecture, Dr. Ikhalia is the mastermind of the world's first social network security awareness application - social network criminal; he leads cyber threat management, threat intelligence, enterprise-class vulnerability assessments and penetration testing on a global scale.
Dr Ikhalia has worked with clients across several sectors worldwide and is known for pushing boundaries and pioneering new avenues within the growing field of cybersecurity. He is a recipient of the Dean's Award for Innovation and Impact (Brunel University, Computer Science Department) for his ingenious innovation - www.socialnetworkcriminal.com.
Dr Ikhalia holds a first degree in Electrical & Electronics Engineering, a Master's degree in Information Technology, and a PhD in Information Systems and Computing. Dr Ikhalia's award-winning research has been published in a variety of peer-reviewed journals, media outlets, including a spotlight as the Best Paper of the 15th International Conference on WWW/Internet in Mannheim, Germany.
Dr Ikhalia’s work has attracted the interest of the UK government. In 2018, he earned a spot at "HutZero" - a government-sponsored cybersecurity program for people with innovative cybersecurity ideas.
Can you predict the next cyber attack through AI-driven intelligence?
Dr Joseph E. Ikhalia
May 24, 2022 / Read More
Emerging Security and Privacy Policies for the Effective IT Governance of UAVs
Unmanned Aerial Vehicles (UAVs) — also known as drones have operating systems, network connections and hardware which all have programmed...
Nov 27, 2019 / Read More
How I Recovered a Hacked WordPress Site in 2 hours
When malicious hackers take over a website it is not a pretty picture and may cause a tremendous psychological, reputational and financia...
Nov 03, 2019 / Read More
Security Challenges and Solutions of a Blockchain-Based Business
Blockchain is largely based on PKI (public key infrastructure) and some of the operational security challenges are due to its fundamental...
Aug 05, 2019 / Read More
Two Factor Authentication and Google Authenticator
In the early years of my Cybersecurity journey, I published a paper on the need for two-factor authentication based on a conceptual frame...
Apr 11, 2019 / Read More
Web Application Security Series: Session Fixation Attack Scenario
A Session Fixation attack allows an attacker to hijack a valid user session. The attacker explores any identified weaknesses in the way a...
Apr 02, 2019 / Read More
Web Application Security Series: Cross-Site Request Forgery (CSRF) Scenario
Cross-Site Request Forgery (CSRF) is an attack that forces an end-user to execute unwanted actions in a Web application in which he/she i...
Mar 26, 2019 / Read More
How to Remove Malware from your Systems Without Antivirus
This article will help you differentiate between the types of malware (viruses, backdoors, worms and trojans) based on their characterist...
Mar 18, 2019 / Read More
How to Protect Your WordPress Website from Malicious Hackers Pt.2
Two weeks ago, I began a series on simple techniques you must implement to secure your WordPress website effectively. In this article, I ...
Feb 17, 2019 / Read More