Featured CYBER SECURITY AND IT INFRASTRUCTURE PROTECTION

Today technology has become a significant driver for businesses thereby making IT environment strategic in…

Featured 2020 CYBERSECURITY, THE YEAR THAT WAS

2020 was a year like no other for all of us, and this especially for the cybersecurity space. It was the year…

Featured Ransomware Attacks: The Process

Ransomware continues to be a significant threat to organizations of all sizes. Every day in our SOC…

Featured MALICIOUS ANDROID APPLICATIONS AND THE THREAT OF THIRD-PARTY APP STORES

Malicious Android applications tend to masquerade as applications that perform a useful service while in the…

Featured DATA PROTECTION 101

THE INS AND OUTS OF THE KENYAN DATA PROTECTION ACT Data protection can be defined as the mechanism of…

Featured ESSENTIAL TIPS FOR PERSONAL CYBERSECURITY

With the heightened Cybercrime what are the essential tips for personal cybersecurity? Do you recall how our…

Featured DATA PROTECTION ACT (2019) COMPLIANCE CHECKLIST

Data protection and privacy is typically applied to personal health information (PHI) and personally…

Featured DATA PROTECTION OFFICER APPOINTMENT IN KENYA

The emergence of data-oriented business models has raised the bar significantly in terms of handling and…

Featured NETWORK SECURITY TOOLS AND TECHNIQUES

A network security is any activity designed to protect the usability and integrity of your network…

Featured VULNERABILITY ASSESSMENT & PENETRATION TESTING AS A CYBER DEFENSE TECHNOLOGY

Cyber-attacks and threats are a real-world problem today with thousands of networks and websites and being…

Featured Same Zero Days, New Target: Chrome

If you are using Google Chrome browser on your Windows, Mac, or Linux computers, you need to update it…

Featured Implementation of Data Protection & Data Privacy Regulations

As more and more social and economic activities have place online, the importance of data privacy and data…

Featured The Future of Internal Audit; Empowering the Third Line

As part of our interactions for Internal Audit Awareness month, we ran this webinar on the future of internal…

Featured Common Cybersecurity Trends to Look out for in 2021

There is no question organizations are still reeling from the massive work-from-home shift that forced them…

Featured IMPACT OF COVID-19 ON THE FUTURE OF BUSINESS CONTINUITY

“Everybody has a plan until they get punched in the mouth” 2020 was a practical example for this…

Featured Fundamentals of Privacy Information Management Systems In Healthcare

Privacy laws are more relevant today than ever before. With data crossing borders following the increased…

Featured Evolution of Antimalware Technologies: Malware Evolution

In the previous article we discussed the different components of the Antimalware and how they evolved to meet…

Featured 3 Ways To Protect Your Identity Online

Within security awareness training programs, cybersecurity experts promote various tactics and best…

Featured Implementation of IT General Controls against ISO 27001 Standard Framework

Complexity of the IT setup has greatly increased. This has resulted to a greater focus around controls in the…

Featured MALICIOUS ANDROID APPLICATIONS AND THE THREAT OF THIRD-PARTY APP STORES

Malicious Android applications tend to masquerade as applications that perform a useful service while in the…