April 23, 2026 by
Tom Abuta
<p style="text-align:justify"><strong><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span dir="ltr" lang="EN-US" style="font-size:12.0pt"><span style="font-family:"Georgia",serif">Introduction</span></span></span></span></strong></p> <p style="text-align:justify"><span dir="ltr" lang="EN-US"><span style="font-family:Georgia,serif; font-size:12pt">Imagine an accident happens on your way to work. You're sitting there frustrated, trying to figure out who's at fault. It's even harder for the traffic officer when both drivers refuse to agree on basic traffic rules.</span></span></p> …
Read More
March 3, 2026 by
Joseph Kyule
<p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span dir="ltr" lang="en-KE" style="font-size:12.0pt"><span style="font-family:"Georgia",serif">Introduction</span></span></strong><br /> <span dir="ltr" lang="en-KE" style="font-size:12.0pt"><span style="font-family:"Georgia",serif">Since their introduction at MIT by Professor Fernando Corbató's team in 1961, digital passwords have become a cornerstone of digital security. Even today, with numerous other methods available, over 90% of users still rely on them. They remain …
Read More
February 7, 2026 by
Joseph Kyule
<p style="margin-left:9px; text-align:left"><span style="font-size:11pt"><span style="font-family:Calibri"><strong><span style="font-size:12.0000pt"><span style="font-family:Georgia"><strong>Introduction</strong></span></span></strong> </span></span></p> <p style="text-align:justify"><span style="font-size:12pt"><span style="font-family:"Times New Roman""><span style="font-size:12.0000pt"><span style="font-family:Georgia">As Kenya's digital ecosystem expands, so does the sophistication of threats aiming to undermine it. The National Kenya Computer Incident Response Team - Coordination Centre (National KE-CIRT/CC), housed within the Communications Authority of Kenya, stands as …
Read More
October 18, 2025 by
Patrick Meki
Data is Africa’s new oil and leaks can be devastating. Safetica, SealPath, and Baffle empower businesses to secure data across endpoints, files, and pipelines keeping operations smooth and compliant.
Read More