{"id":27,"date":"2016-02-23T14:36:07","date_gmt":"2016-02-23T14:36:07","guid":{"rendered":"https:\/\/osama.alkadi.net\/?page_id=21"},"modified":"2020-07-26T16:24:18","modified_gmt":"2020-07-26T16:24:18","slug":"about","status":"publish","type":"page","link":"https:\/\/osama.alkadi.net\/?page_id=27","title":{"rendered":"About Me"},"content":{"rendered":"<p>I am a cybersecurity researcher\u00a0and architect with experience across the entire product development lifecycle including, architecture, design, deployment and operations. Passionate about using cutting edge technology to solve business problems, while ensuring solutions are aligned with business strategy and security best practices. I have also published several papers in top-tier computing and security journals\/conferences, such as IEEE IoT and IEEE Transactions on forensics and Security.<\/p>\n<p>I write occasionally in this blog about things that interest me as a cybersecurity practitioner, challenges, troubleshooting, problem\u00a0solving and pentesting. See the sidebar for a list of categories\/tags.<\/p>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"\" style=\"vertical-align: middle;\" src=\"https:\/\/osama.alkadi.net\/wp-content\/uploads\/2018\/07\/key2-300x289.png\" alt=\"\" width=\"27\" height=\"26\" \/> <a href=\"https:\/\/osama.alkadi.net\/?page_id=440\">Public key<\/a><\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\"\" style=\"vertical-align: middle;\" src=\"https:\/\/osama.alkadi.net\/wp-content\/uploads\/2018\/07\/Unknown.png\" alt=\"\" width=\"18\" height=\"18\" \/>\u00a0\u00a0<a href=\"http:\/\/www.linkedin.com\/in\/osama-alkadi\">View my profile<\/a><\/div>\n<div><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-455 alignleft\" src=\"https:\/\/osama.alkadi.net\/wp-content\/uploads\/2018\/07\/frame.png\" alt=\"\" width=\"154\" height=\"154\" srcset=\"https:\/\/osama.alkadi.net\/wp-content\/uploads\/2018\/07\/frame.png 300w, https:\/\/osama.alkadi.net\/wp-content\/uploads\/2018\/07\/frame-150x150.png 150w\" sizes=\"auto, (max-width: 154px) 100vw, 154px\" \/><\/div>\n","protected":false},"excerpt":{"rendered":"<p>I am a cybersecurity researcher\u00a0and architect with experience across the entire product development lifecycle including, architecture, design, deployment and operations. Passionate about using cutting edge technology to solve business problems, while ensuring solutions are aligned with business strategy and security best practices. I have also published several papers in top-tier computing and security journals\/conferences, such<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-27","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/osama.alkadi.net\/index.php?rest_route=\/wp\/v2\/pages\/27","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/osama.alkadi.net\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/osama.alkadi.net\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/osama.alkadi.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/osama.alkadi.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=27"}],"version-history":[{"count":43,"href":"https:\/\/osama.alkadi.net\/index.php?rest_route=\/wp\/v2\/pages\/27\/revisions"}],"predecessor-version":[{"id":608,"href":"https:\/\/osama.alkadi.net\/index.php?rest_route=\/wp\/v2\/pages\/27\/revisions\/608"}],"wp:attachment":[{"href":"https:\/\/osama.alkadi.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=27"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}