See how it works
Book Umar with Paydesk
Make your booking securely through paydesk for these benefits:
1
Preferred Booking Channel
Umar is more likely to commit to assignments booked through paydesk, as it is a trusted platform that validates the seriousness and legitimacy of each engagement.2
Insured Bookings for Peace of Mind
We provide basic insurance coverage with each booking on paydesk, giving both you and the media professional confidence and protection while they work for you.3
Effortless Online Payment
Paydesk offers a payment protection system to ensure payments are only finalized when you are satisfied with the job completion. Freelancers trusts our process that guarantees their efforts are rewarded upon successful delivery of servicesStill have questions?
Check FAQAbout Umar
Umar Farouk is a journalist based in Abuja, Nigeria.
Portfolio
Nigeria's Security Challenges: A Call for Action Beyond Rhetoric
The article discusses the severe security challenges facing Nigeria, including the activities of Boko Haram, banditry, and kidnapping. It highlights a recent attack on Governor Babangana Zulum's convoy, which resulted in injuries and has sparked widespread condemnation and calls for action. The National Assembly and the Nigeria Governor’s Forum are among those demanding a revamp of the country's security architecture. The author questions the government's role in addressing these issues and emphasizes the need for both technical and adaptive approaches to tackle the internal aggression and socio-economic disruptions caused by these security threats. The article suggests that Nigeria should learn from the experiences of other countries like Sri Lanka and Colombia in dealing with similar challenges.
Youth Unemployment in Jigawa: A Call for Action
The article discusses the issue of youth unemployment in Jigawa State, Nigeria, and its implications for security and socio-economic development. The author recalls the promise of job creation by the APC and Governor Muhammadu Badaru during the 2015 elections, noting the subsequent recruitment of teachers but arguing that these efforts are insufficient given the high unemployment rates reported by the NBS. The author suggests that solutions should focus on entrepreneurship and skills development rather than politically motivated programs. The piece also criticizes political leaders for failing to translate electoral victories into meaningful improvements for the youth, emphasizing the urgency of addressing unemployment to prevent the escalation of crime and insecurity.
ISO 27001 Lab Series: Project Kick-Off and Building a Winning Team
The article outlines the initial steps for implementing an ISO 27001 project at DevEngineers, emphasizing the importance of a project kick-off meeting to align objectives, allocate resources, and assess risks. It highlights the need for a well-rounded team, including a dedicated leader, project manager, subject matter experts, and cross-functional representatives, to ensure successful implementation. The article stresses the significance of communication, collaboration, and training in fostering a security-conscious culture and achieving project milestones. It concludes by encouraging stakeholder engagement and celebrating team achievements to maintain motivation and drive the project's success.
ISO 27001 Lab Series: Establishing the Context of a Software Development Company
The article discusses the process of establishing the internal and external context for a software development company named DevEngineers in Nigeria, as part of setting up an Information Security Management System (ISMS) compliant with ISO 27001. It outlines the company's structure, mission, values, services, and stakeholders, as well as the regulatory environment. The company's mission is to empower businesses with innovative and secure software solutions, and it has delivered over 100 custom software solutions. The article also introduces various products developed by DevEngineers, including SecureWebGuard, DataGuard+, and MobileSecure.
ISO 27001 Lab Series: Documenting the Scope of An Organization’s ISMS
The article discusses the scope of implementing an Information Security Management System (ISMS) for DevEngineers, focusing on identifying and protecting critical assets such as intellectual property, client data, and information technology infrastructure. It outlines the steps to document the scope, including asset inventory and understanding interdependencies. Key assets include source code, user interface, trade secrets, trademarks, and patents. The article also highlights the importance of protecting client data, network infrastructure, hardware resources, development tools, cloud services, security infrastructure, and backup systems.
Why Nigerian Security Agencies Kill Unarmed Civilians
The article discusses the persistent issue of fatal encounters between Nigerian security agencies and dissenting groups, leading to civilian deaths. It references historical comments by Fela Anikulapo-Kuti about the sorrow and bloodshed associated with these agencies. Recently, confrontations between the police and the Shiites, as well as the DSS and IPOB, resulted in multiple fatalities. The author criticizes the Nigerian government's disregard for civilian life, especially when dealing with non-violent groups like IPOB. The article suggests that IPOB should reconsider its strategy to avoid unnecessary loss of life, as the Nigerian government has a history of responding with violence to unarmed groups while offering amnesty to armed militants. The author also comments on the legal status of IPOB and the actions of its leader, Nnamdi Kanu, urging the group to adhere to non-violence and legal processes.
The Evolutionary Ecology of Fish Venom: Insights into Molecular Characterization and Biomedical Applications
The article discusses the biological activities of fish venom, including its impact on enzyme activity, cytotoxicity, neurotoxicity, muscular toxicity, haemolytic, and cardiotoxicity. Fish venom disrupts physiological systems in other species and humans. Transcriptomic analysis has revealed numerous proteins relevant to pharmacological activity, but fish venoms are not well-studied due to their instability at ambient temperatures. Venomous fish, inhabiting marine and freshwater environments, have specialized venom-delivery apparatuses. Fish stings in coastal areas pose serious toxic effects on fishermen, local communities, and visitors. The paper provides a perspective on fish venom research, its molecular evolution, physiology, diversity, and its potential in biomedical applications. The study aims to serve as a baseline for future research and drug development for pharmaceutical uses.
From Paper to Practice: Unlocking the Potential of Clause 8 for Successful ISMS Implementation
The article discusses the importance of Clause 8 in the ISO 27001 standard, which addresses the operation of the Information Security Management System (ISMS). It highlights the transition from policy and procedure definition to the practical implementation and day-to-day operation of the ISMS. The key elements of Clause 8 include operational planning and control, risk assessment and treatment, and setting information security objectives. The author emphasizes the significance of Clause 8 in ensuring that the ISMS is not merely theoretical but a functioning system that provides a return on investment by adapting to the dynamic nature of cybersecurity threats.
Dietary fish oil promotes ovary development in female adult spotted scat (Scatophagus argus) through influencing gene expression
The study investigates the effects of dietary fish oil on ovary development in female adult spotted scat (Scatophagus argus). Two groups of fish were fed diets containing either soybean oil (SO) or fish oil (FO) for 60 days. Results showed similar body weights but higher (though not statistically significant) gonadosomatic index (GSI) and phase IV ovary development in the FO group. Serum estradiol (E2) levels were significantly higher in the FO group, as were the proportions of n-3 long-chain polyunsaturated fatty acids (LC-PUFA) in the ovaries. Transcriptome sequencing revealed 68 up-regulated and 193 down-regulated genes in the FO group, including genes related to ovary maturation and lipid metabolism. The study suggests that fish oil promotes ovary development by influencing gene expression related to steroid hormone, glucose, and lipid metabolism. Ethical approval for the study was granted by Guangdong Ocean University's Committee on the Ethics of Animal Experiments.
Steering leadership in a new direction; improving boardroom discussion in a digital age
Corporate boards must navigate the dynamics of the digital age, ensuring accountability and strategic decision-making through technology. Financial models like Monte Carlo Simulation and Machine Learning aid in risk management and auditing, while tools like Power BI and Tableau improve communication. Compatibility assessments in M&As consider technological systems and business models. Digital transaction media like Cryptocurrency and Blockchain are crucial for financial data security, and compliance with financial regulations may require automated systems. Web analytics optimize online products. Overcoming resistance to change is a significant challenge, and statistical models with historical data can support the transition towards digital transformation.
Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium
doloremque laudantium,
totam rem aperiam, eaque ipsa quae ab illo inventore veritatis et quasi architecto beatae vitae dicta sunt explicabo. Nemo enim ipsam voluptatem quia voluptas sit aspernatur aut odit aut fugit, sed quia consequuntur magni dolores eos qui ratione voluptatem sequi nesciunt. Neque porro quisquam est, qui dolorem ipsum quia dolor sit amet, consectetur, adipisci velit, sed quia non numquam eius modi tempora incidunt ut labore et dolore magnam aliquam quaerat voluptatem. Ut enim ad minima veniam, quis nostrum exercitationem ullam corporis suscipit laboriosam, nisi ut aliquid ex ea commodi consequatur?
doloremque laudantium,
totam rem aperiam, eaque ipsa quae ab illo inventore veritatis et quasi architecto beatae vitae dicta sunt explicabo. Nemo enim ipsam voluptatem quia voluptas sit aspernatur aut odit aut fugit, sed quia consequuntur magni dolores eos qui ratione voluptatem sequi nesciunt. Neque porro quisquam est, qui dolorem ipsum quia dolor sit amet, consectetur, adipisci velit, sed quia non numquam eius modi tempora incidunt ut labore et dolore magnam aliquam quaerat voluptatem. Ut enim ad minima veniam, quis nostrum exercitationem ullam corporis suscipit laboriosam, nisi ut aliquid ex ea commodi consequatur?
Want to see more portfolio samples?
Sign up to paydesk, it’s free!
Log In
Sign Up
×
Umar's
confirmed information
✓
Financial institution
Verified Dec 2021
✓
Phone number
Verified Dec 2021
✓
Joined
Dec 2021