top of page
Girl with Tablet


The key to thriving in today's virtual world is being candid and authentic. At the heart of my blog's mission is celebrating one's personality, sense of humor, and heart. Connecting with the world is what motivated me to start an awareness and knowledge center about cyber security. Take a look around my website to see what I've been up to, to find out what interests and excites you, and to see what I've been up to.

It is with great pleasure that I introduce myself as De'Andre Paul, an Information Security Engineer. To support my passion for information security engineering, I've been involved in numerous careers, activities, and events. Throughout my career development, I have learned that cyber security is not for the faint-hearted, but for the curious who want to learn about and to check everything related to InfoSec and implement ways and strategies to mitigate risk because our profession requires zero trust in systems that are susceptible to risk, such as online and network systems.

During the start of my career, I was exposed to many hurdles that provided me with an understanding that cybersecurity professionals cannot be excluded from risk. In my free time, I enjoy music, cooking, movies, dancing, watching basketball, and physical activities. I enjoy reading books outside my profession such as The New Earth by Eckhart Tolle and Seat of the Soul by Gary Zurkav are just two of the many other books I enjoy reading outside my profession because I am a philosophy buff.

I'm done talking about myself. It is recommended that you do proper research, before you put yourself and your career at risk by not joining organizations offering the career at an affordable cost with easy career progression, as becoming a security professional does not just happen by clicking a button from a cheap institution looking to make a quick buck, but there are a lot of stages, laws, processes, expertise, networking skills, and engineering involved. As tecchnology continues to be in constant innovation - emerging IoT, disruptive cyber threats - and threat actors are always coming up with new ways and techniques.

Learn More
bottom of page