Blog Categories

Thanks for reading! Share your thoughts below.

Is your Visibility Failing you? Where You are getting it Wrong on Cyber Security Visibility

Is your Visibility Failing you? Where You are getting it Wrong on Cyber Security Visibility

<p style="text-align:justify"><strong><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span dir="ltr" lang="EN-US" style="font-size:12.0pt"><span style="font-family:&quot;Georgia&quot;,serif">Introduction</span></span></span></span></strong></p> <p style="text-align:justify"><span dir="ltr" lang="EN-US"><span style="font-family:Georgia,serif; font-size:12pt">Imagine an accident happens on your way to work. You&#39;re sitting there frustrated, trying to figure out who&#39;s at fault. It&#39;s even harder for the traffic officer when both drivers refuse to agree on basic traffic rules.</span></span></p> …

Read More

Why Strong Passwords Still Matter (And How to Get Them Right)

Why Strong Passwords Still Matter (And How to Get Them Right)

<p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span dir="ltr" lang="en-KE" style="font-size:12.0pt"><span style="font-family:&quot;Georgia&quot;,serif">Introduction</span></span></strong><br /> <span dir="ltr" lang="en-KE" style="font-size:12.0pt"><span style="font-family:&quot;Georgia&quot;,serif">Since their introduction at MIT by Professor Fernando Corbat&oacute;&#39;s team in 1961, digital passwords have become a cornerstone of digital security. Even today, with numerous other methods available, over 90% of users still rely on them. They remain …

Read More

Protecting Kenya's Digital Future: A Snapshot of the National KE-CIRT/CC's Q1 2025-2026 Cybersecurity Report

Protecting Kenya's Digital Future: A Snapshot of the National KE-CIRT/CC's Q1 2025-2026 Cybersecurity Report

<p style="margin-left:9px; text-align:left"><span style="font-size:11pt"><span style="font-family:Calibri"><strong><span style="font-size:12.0000pt"><span style="font-family:Georgia"><strong>Introduction</strong></span></span></strong>&nbsp;&nbsp;&nbsp;&nbsp;</span></span></p> <p style="text-align:justify"><span style="font-size:12pt"><span style="font-family:&quot;Times New Roman&quot;"><span style="font-size:12.0000pt"><span style="font-family:Georgia">As Kenya&#39;s digital ecosystem expands, so does the sophistication of threats aiming to undermine it. The National Kenya Computer Incident Response Team - Coordination Centre (National KE-CIRT/CC), housed within the Communications Authority of Kenya, stands as …

Read More

Data: The New Oil Secured by Safetica, SealPath, and Baffle

Data: The New Oil Secured by Safetica, SealPath, and Baffle

Data is Africa’s new oil and leaks can be devastating. Safetica, SealPath, and Baffle empower businesses to secure data across endpoints, files, and pipelines keeping operations smooth and compliant.

Read More
← Back to All Blogs