Five steps to evaluating a DDoS managed service provider

The news that the Southern African Department of Labour was recently able to foil a distributed denial of service (DDoS) attack on one of its external facing servers in early September reminds us that businesses and governments must remain vigilant at all times. While this DDOS attack was unsuccessful, a 2016 attack in Liberia, West […]

Continue Reading

IT Leadership: IT security – oxygen or onion?

By: Mark Walker, associate vice president of Sub-Saharan Africa at International Data Corporation (IDC) Search for security on Google. The engine will autofill with – security is like oxygen and security is like an onion. Both are true. Security is the oxygen that keeps the business alive. Without it there is the risk of breach, […]

Continue Reading

How to track your lost phone that is turned off

By Elizabeth Mason Smartphones have become an integral part of a person’s life. Whether it is a boon or a curse is another topic but surely it has made the life much easier. Day to day information of a person is stored in their phone; hence, one just cannot afford to lose their phone. However, […]

Continue Reading

3 ways you can keep yourself and your devices protected

Connecting to the Internet today has become a norm for most of us, as we enjoy the convenience of public Wi-Fi, using smartphones to download apps, watching live stream videos, shopping online or simply just catching up on news events – connectivity makes life so much easier! So, while we salute the estimated 43 million Kenyans who […]

Continue Reading

Opinion: Taking enterprise security to the board

It’s that time of year, again, with many companies busying themselves in the art of budgeting and forecasting for 2018. In some companies, this means the Chief Information Security Officer (CISO) having to communicate the importance of including enterprise security in this planning, using a language that the members of the board will understand. “For […]

Continue Reading

Infographic: Security Mindsets to Adopt Today

Threats to business security are a never-ending story. From basic data breaches to ransomware, hackers are always finding new ways to infiltrate businesses. To keep threats at bay, network security never stops evolving – but has your approach to it? If you’re still approaching it the way you were 5 years, 1 year, or even […]

Continue Reading

Android Security: Mobiles Phones Spying is it Legal or not?

Smart phone is an individual’s property and it contains most personal and private data of a person. Every person has legal right to secure or hide its personal information from others as everyone wants some space in his own life. Nobody likes interference of others in their own personal life. People want security in practical […]

Continue Reading

Don’t be a sitting duck against #IoT threats

As the Internet of Things (IoT) continues to gain traction, organizations will have to reassess their security practices to accommodate the increase in security alerts. According to Patrick Rhude, Head of Product Management in Nokia’s Security Product Unit, security organizations already find themselves overwhelmed with the volume, variety and velocity of security data alerts. “It […]

Continue Reading

Clues are Dead – Kaspersky Lab’s Threat Predictions 2017

Kaspersky Lab’s discovery in 2016 of an APT-able to create new tools for each victim has effectively killed off ‘Indicators of Compromise’ as a reliable means of detecting infection, according to the company’s Threat Predictions for 2017. The Predictions are prepared annually by the company’s expert Global Research and Analysis Team (GReAT) and are based […]

Continue Reading
As much as 70 percent of IoT devices comprise security flaws, which means devices that you own could get hacked by online criminals too.

Guest Post: Do You Own One of the Most Hackable Devices?

An IT solutions company in the Philippines, as well as other cybersecurity firms, have stressed that everything connected to the Internet is hackable. From traffic lights to electrical grids, highway signs to fitness trackers—all of these are wired to the Internet, a web of connected systems so diverse that they fall into the nondescript category […]

Continue Reading

Cyber Crime: Are your online banking transactions safe?

‘Checking your account balance, paying bills and managing your finances… Nowadays, it is pretty normal to do all those things online…. But are you sure you do them in the most secure way? Presently, cybersecurity or (insecurity) in Kenya is the single biggest threat to business in terms of the consumption and use of Information […]

Continue Reading

Kaspersky Lab announces new business solution to empower SMBs

Kaspersky Lab announces a new Software-as-a-Service solution that will provide small and medium-sized businesses with multi-layered IT security. Known as Kaspersky Endpoint Security Cloud, the solution offers advanced functionality and proven protection that can be managed easily via a simple cloud-based console with an intuitive and user-friendly interface. Small and medium-sized businesses (SMBs) are using 100-1000 […]

Continue Reading
Sophos Intercept X installs alongside existing endpoint security software from any vendor, immediately boosting endpoint protection by stopping malicious code before it executes.

Sophos unveils Sophos Intercept X to extend its Next-Generation Endpoint Security Capabilities

Sophos has announced has unveiled its next-generation endpoint security product that stops zero-day malware, unknown exploit variants and stealth attacks. Known as Sophos Intercept X, the product includes an advanced anti-ransomware feature that can detect previously unknown ransomware within seconds. Sophos Intercept X installs alongside existing endpoint security software from any vendor, immediately boosting endpoint […]

Continue Reading

Sophos recognized as a Quadrant Leader of Gartner’s 2016

Security solutions provider Sophos has been positioned in the “Leaders” quadrant of Gartner, Inc.’s Aug. 30, 2016, “Magic Quadrant for Unified Threat Management.” This is the 5th year the company has been recognized as a Quadrant.   The quadrant is based on an assessment of a company’s ability to execute and completeness of vision. Sophos […]

Continue Reading
The R&D center will be focused on developing data analysis and machine learning technologies for the company’s enterprise solutions offering. Photo Source: Kaspersky Lab Blog

Kaspersky Lab opens its first Research and Development office in Europe

Kaspersky Lab has announced the opening of its first European research and development (R&D) center, in Dublin, Ireland. The company initial investment into the office is said to be about USD$5 million, and according to the company, the location was selected on account of Dublin’s growing reputation as a major European tech hub. The newly […]

Continue Reading

Guest Post: The security questions raised by IoT

In a world where devices are getting more powerful and smaller, IoT has become a common term even to the layman. Using sensors and genius level engineering, devices are getting smaller, more efficient and anything can be connected to anything. Today hotels are using RFID tags to remotely track their towel inventory, you can turn […]

Continue Reading

Security software giant Avast is acquiring rival AVG for $1.3b

Security software company Avast  has announced that it is buying rival AVG Technologies for $1.3 billion in an all-cash deal. The transaction  has already been approved by the Management and Supervisory Board of both Avast and AVG. This transaction, Avast say will allow them to expand its business worldwide across more markets. Both firms trace […]

Continue Reading

Sophos meets Kenyan patners to shares its new network security features

Network and endpoint security firm Sophos today met its partners in Kenya to showcase and educate them on new security features on their portfolio of security products. This according to the company is part of the multi-city Partner forums held in Africa, which have also been held in Nigeria and Tanzania. Dubbed “Discover Sophos”, the […]

Continue Reading

ESET Unveils New tool to help parents monitor their children’s online activities

Global Security software provider ESET has unveiled a new tool to help parents monitor what their children are doing online. The ESET Parental Control for Android app provides provides age and category-based filters and will restrict children’s access to inappropriate web content. The application also comes with an ‘Application Guard & Time Management’ function that will also help […]

Continue Reading

Guest Post: 6 ways you can protect your business from hackers

Your business is invaluable. You put in a lot of hard work towards the growth of your business and gaining customer trust. One day you wake up early, as usual, dress up and rush to your office. When you start up your computer you notice something. Everything is frozen! The files you were working on […]

Continue Reading

1,800 cameras to be mounted on Nairobi streets to improve security

In a project aimed at improving the security situation in the country through technology,  1,800 cameras will be  mounted in the streets of Nairobi and other public places to monitor what goes on around the city. This announcement was made today by President Uhuru Kenyatta while touring the National Police Service headquarters. Accompanied by his Deputy  William Ruto […]

Continue Reading