Blog Categories

Thanks for reading! Share your thoughts below.

Why Strong Passwords Still Matter (And How to Get Them Right)

Why Strong Passwords Still Matter (And How to Get Them Right)

<p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span dir="ltr" lang="en-KE" style="font-size:12.0pt"><span style="font-family:&quot;Georgia&quot;,serif">Introduction</span></span></strong><br /> <span dir="ltr" lang="en-KE" style="font-size:12.0pt"><span style="font-family:&quot;Georgia&quot;,serif">Since their introduction at MIT by Professor Fernando Corbat&oacute;&#39;s team in 1961, digital passwords have become a cornerstone of digital security. Even today, with numerous other methods available, over 90% of users still rely on them. They remain …

Read More

Kenya’s Cybersecurity Landscape Q2 2025-2026: Rising Threats & Strengthened Defences

Kenya’s Cybersecurity Landscape Q2 2025-2026: Rising Threats & Strengthened Defences

<p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span dir="ltr" lang="EN-US" style="font-size:12.0pt"><span style="font-family:&quot;Georgia&quot;,serif">Introduction</span></span></strong></span></span></p> <p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span dir="ltr" lang="EN-US" style="font-size:12.0pt"><span style="font-family:&quot;Georgia&quot;,serif">The latest quarterly report from Kenya&rsquo;s National KE-CIRT/CC reveals a sharp escalation in cyber threats, alongside growing national efforts to build resilience through training, partnerships, and proactive advisories.</span></span></span></span></p> <p style="text-align:justify"><strong><span style="font-size:12pt"><span style="font-family:Georgia,serif">Key Findings: A Surge …

Read More

Protecting Kenya's Digital Future: A Snapshot of the National KE-CIRT/CC's Q1 2025-2026 Cybersecurity Report

Protecting Kenya's Digital Future: A Snapshot of the National KE-CIRT/CC's Q1 2025-2026 Cybersecurity Report

<p style="margin-left:9px; text-align:left"><span style="font-size:11pt"><span style="font-family:Calibri"><strong><span style="font-size:12.0000pt"><span style="font-family:Georgia"><strong>Introduction</strong></span></span></strong>&nbsp;&nbsp;&nbsp;&nbsp;</span></span></p> <p style="text-align:justify"><span style="font-size:12pt"><span style="font-family:&quot;Times New Roman&quot;"><span style="font-size:12.0000pt"><span style="font-family:Georgia">As Kenya&#39;s digital ecosystem expands, so does the sophistication of threats aiming to undermine it. The National Kenya Computer Incident Response Team - Coordination Centre (National KE-CIRT/CC), housed within the Communications Authority of Kenya, stands as …

Read More

Enhancing Email Security in the Workplace: Why Every Email Matters

Enhancing Email Security in the Workplace: Why Every Email Matters

<p style="text-align:center">&nbsp;</p> <p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri"><strong><span style="font-size:13.0000pt"><span style="font-family:Georgia"><strong>Introduction</strong></span></span></strong></span></span></p> <p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri"><span style="font-size:12.0000pt"><span style="font-family:Georgia">Every working day at your workplace begins and ends with email. From internal memos and departmental updates to supplier communication and patient-related coordination, email remains one of the most relied tools in our daily operations and because …

Read More

Firewall Under Siege: Securing Your First Line of Digital Defense in 2026

Firewall Under Siege: Securing Your First Line of Digital Defense in 2026

<p style="text-align:justify"><span style="font-size:16px"><span style="background-color:#ffffff"><strong><span style="font-family:Georgia"><span style="color:#0f1115"><strong>Introduction</strong></span></span></strong></span></span></p> <p style="text-align:justify"><span style="background-color:#ffffff"><span style="font-size:12.0000pt"><span style="font-family:Georgia"><span style="color:#0f1115">In the fast-moving digital economy of East Africa, a silent but critical battle is intensifying at the network&#39;s perimeter. The firewall&mdash;long considered the steadfast guardian at the gate&mdash;is now a primary target for sophisticated cyberattacks. As we enter 2026, …

Read More

Cybersecurity in Kenya in 2026

Cybersecurity in Kenya in 2026

As Kenya enters 2026, cybersecurity shifts from random incidents to targeted, intelligence-driven threats, demanding stronger identity security, preparedness, and practical resilience across organizations.

Read More

M-TIBA Breach: Businesses Must Move from Declarations to Demonstrable Action

M-TIBA Breach: Businesses Must Move from Declarations to Demonstrable Action

Kenya’s digital economy is accelerating, driven by rapid cloud adoption, yet data breaches continue to undermine trust and expose organisations to regulatory risk. Recent incidents—including the April 2025 Gmail credential theft affecting 183 million users and the October 2025 M-TIBA breach exposing 4.8 million medical records—show that certification alone does …

Read More

Beyond the 'No': What Rejection Really Teaches in Cybersecurity Sales

Beyond the 'No': What Rejection Really Teaches in Cybersecurity Sales

Cybersecurity sales is a pursuit of trust. Every call, every “no,” builds the persistence and insight needed to secure organizations before threats strike.

Read More

As 55% of Kenyan Firms Turn to AI for Customer Service, Data Protection Takes Center Stage.

As 55% of Kenyan Firms Turn to AI for Customer Service, Data Protection Takes Center Stage.

Kenyan businesses are rapidly embracing AI to revolutionize customer service, with 55% already deploying chatbots and automation tools to enhance efficiency and satisfaction. Yet, this digital transformation brings pressing data protection challenges under Kenya’s Data Protection Act (2019). As AI systems increasingly profile customers and process sensitive data, conducting Data …

Read More

Kenya's Cyber Threat Landscape: Evolving Smarter, Not Safer

Kenya's Cyber Threat Landscape: Evolving Smarter, Not Safer

Kenya’s cyber threats dropped sharply, but attackers are getting smarter with AI-driven tactics. This blog explores the shift and how Kenya is strengthening cyber resilience.

Read More
← Back to All Blogs