May 6, 2026 by
Tom Abuta
<p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span dir="ltr" lang="EN-US" style="font-size:12.0pt"><span style="font-family:"Georgia",serif">Introduction</span></span></strong></span></span></p> <p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span dir="ltr" lang="EN-US" style="font-size:12.0pt"><span style="font-family:"Georgia",serif">You might be looking outside yet the employee in the next office can cause your biggest lose. </span></span></span></span></p> <p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span dir="ltr" lang="EN-US" style="font-size:12.0pt"><span style="font-family:"Georgia",serif">In January 2024, an incident attributed to “human error” was …
Read More
April 23, 2026 by
Tom Abuta
<p style="text-align:justify"><strong><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span dir="ltr" lang="EN-US" style="font-size:12.0pt"><span style="font-family:"Georgia",serif">Introduction</span></span></span></span></strong></p> <p style="text-align:justify"><span dir="ltr" lang="EN-US"><span style="font-family:Georgia,serif; font-size:12pt">Imagine an accident happens on your way to work. You're sitting there frustrated, trying to figure out who's at fault. It's even harder for the traffic officer when both drivers refuse to agree on basic traffic rules.</span></span></p> …
Read More
March 3, 2026 by
Joseph Kyule
<p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span dir="ltr" lang="en-KE" style="font-size:12.0pt"><span style="font-family:"Georgia",serif">Introduction</span></span></strong><br /> <span dir="ltr" lang="en-KE" style="font-size:12.0pt"><span style="font-family:"Georgia",serif">Since their introduction at MIT by Professor Fernando Corbató's team in 1961, digital passwords have become a cornerstone of digital security. Even today, with numerous other methods available, over 90% of users still rely on them. They remain …
Read More
February 13, 2026 by
Joseph Kyule
<p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span dir="ltr" lang="EN-US" style="font-size:12.0pt"><span style="font-family:"Georgia",serif">Introduction</span></span></strong></span></span></p> <p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span dir="ltr" lang="EN-US" style="font-size:12.0pt"><span style="font-family:"Georgia",serif">The latest quarterly report from Kenya’s National KE-CIRT/CC reveals a sharp escalation in cyber threats, alongside growing national efforts to build resilience through training, partnerships, and proactive advisories.</span></span></span></span></p> <p style="text-align:justify"><strong><span style="font-size:12pt"><span style="font-family:Georgia,serif">Key Findings: A Surge …
Read More
February 7, 2026 by
Joseph Kyule
<p style="margin-left:9px; text-align:left"><span style="font-size:11pt"><span style="font-family:Calibri"><strong><span style="font-size:12.0000pt"><span style="font-family:Georgia"><strong>Introduction</strong></span></span></strong> </span></span></p> <p style="text-align:justify"><span style="font-size:12pt"><span style="font-family:"Times New Roman""><span style="font-size:12.0000pt"><span style="font-family:Georgia">As Kenya's digital ecosystem expands, so does the sophistication of threats aiming to undermine it. The National Kenya Computer Incident Response Team - Coordination Centre (National KE-CIRT/CC), housed within the Communications Authority of Kenya, stands as …
Read More
February 4, 2026 by
Patrick Meki
<p style="text-align:center"> </p> <p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri"><strong><span style="font-size:13.0000pt"><span style="font-family:Georgia"><strong>Introduction</strong></span></span></strong></span></span></p> <p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri"><span style="font-size:12.0000pt"><span style="font-family:Georgia">Every working day at your workplace begins and ends with email. From internal memos and departmental updates to supplier communication and patient-related coordination, email remains one of the most relied tools in our daily operations and because …
Read More
January 22, 2026 by
Joseph Kyule
<p style="text-align:justify"><span style="font-size:16px"><span style="background-color:#ffffff"><strong><span style="font-family:Georgia"><span style="color:#0f1115"><strong>Introduction</strong></span></span></strong></span></span></p> <p style="text-align:justify"><span style="background-color:#ffffff"><span style="font-size:12.0000pt"><span style="font-family:Georgia"><span style="color:#0f1115">In the fast-moving digital economy of East Africa, a silent but critical battle is intensifying at the network's perimeter. The firewall—long considered the steadfast guardian at the gate—is now a primary target for sophisticated cyberattacks. As we enter 2026, …
Read More
January 7, 2026 by
Patrick Meki
As Kenya enters 2026, cybersecurity shifts from random incidents to targeted, intelligence-driven threats, demanding stronger identity security, preparedness, and practical resilience across organizations.
Read More
November 14, 2025 by
Ian Makambu
Kenya’s digital economy is accelerating, driven by rapid cloud adoption, yet data breaches continue to undermine trust and expose organisations to regulatory risk. Recent incidents—including the April 2025 Gmail credential theft affecting 183 million users and the October 2025 M-TIBA breach exposing 4.8 million medical records—show that certification alone does …
Read More
November 8, 2025 by
Hannah Ngina
Cybersecurity sales is a pursuit of trust. Every call, every “no,” builds the persistence and insight needed to secure organizations before threats strike.
Read More