Tag: Security

Cisco's NetAcad program commits to train 1M African students by 2025

Cisco’s cloud-native security platform Cisco SecureX now available globally

Cisco has announced the general global availability of its cloud-native security platform Cisco SecureX. Cisco launched this platform in February as a way of...

Covid and Effective Data Management in IT

Information technology’s speed of evolution offers vast opportunities for all. Managers within the IT environment face a particularly unique challenge; staying ahead of rapid...

Developers to make API calls with SophosLabs Intelix, a Cloud-Based Threat Intelligence Platform

SophosLabs Intelix, a cloud-based threat intelligence and analysis platform enables developers to build more secure applications. Developers will be able to make API calls...

Google is partnering with security companies to crack down on malicious apps before they...

Android is messed up, not entirely, but there is a never-ending threat to malicious apps being harbored in the official store. While it is not...

Sophos Cloud Optix to provide cloud security vulnerabilities to Amazon Web Services Customers

Sophos today announced the availability of Sophos Cloud Optix on Amazon Web Services (AWS) Marketplace. As a new agentless software-as-a-service (SaaS) offering, Cloud Optix automatically discovers...

[Column] Tips for safer online transactions on your smartphone

Internet-enabled devices like Laptops, Tablets and Smartphones have increased online transactions. From easily transferring money, to placing orders with online stores like Jumia, to...

[Column] Seven Best Practices for Securing the Public Cloud

The simplicity and cost-effectiveness of the public cloud have led more and more organizations to take advantage of Amazon Web Services (AWS), Microsoft Azure,...

[Column] Data sovereignty in Africa, why you should care

African businesses are currently making massive investments in things like machine learning and artificial intelligence tools and are using cloud and virtualized infrastructure to...

Leadway Insurance – Your Go-To Insurance Broker company

Kenya has a number of insurance companies ranging from industry giants with thousands of policies in force to small companies that sell only a...
Facebook CEO Mark Zuckerberg

Facebook goes after personality quizzes to fight data leaks

As part of its commitment to privacy and security and also stop data leaks, Facebook has announced that it is clamping down on personality...
facebook

Facebook stored up to 600 million user passwords in plain text

By now you have probably heard of the scary news of how Facebook stored millions of user’s passwords in plain text. The news was...
Mobile Data for Social Impact forum

Government and Private Sector to collaborate on Mobile Phone Data Protection & Privacy Framework

The Government has committed to work with telecommunications companies and civil society advocates to develop a data privacy and protection framework that will help...

Safaricom Introduces I.T Security Solutions For its Enterprise Customers

The services include Managed Security Solutions, Security Assurance and Advisory services as well as Managed Security Operations Center solutions and will enable the customers to access a wide range of security solutions to protect their information technology (I.T) systems.

Business Security 101: 4 Easy Ways to Keep Your Data Safe

Data breaches are now more common than ever. As a business owner, safeguarding your business data is as important as securing your personal information....

Five steps to evaluating a DDoS managed service provider

The news that the Southern African Department of Labour was recently able to foil a distributed denial of service (DDoS) attack on one...

IT Leadership: IT security – oxygen or onion?

By: Mark Walker, associate vice president of Sub-Saharan Africa at International Data Corporation (IDC) Search for security on Google. The engine will autofill with –...

How to track your lost phone that is turned off

By Elizabeth Mason Smartphones have become an integral part of a person’s life. Whether it is a boon or a curse is another topic but...

3 ways you can keep yourself and your devices protected

Connecting to the Internet today has become a norm for most of us, as we enjoy the convenience of public Wi-Fi, using smartphones to...

Opinion: Taking enterprise security to the board

It’s that time of year, again, with many companies busying themselves in the art of budgeting and forecasting for 2018. In some companies, this means...

Infographic: Security Mindsets to Adopt Today

Threats to business security are a never-ending story. From basic data breaches to ransomware, hackers are always finding new ways to infiltrate businesses. To...

Android Security: Mobiles Phones Spying is it Legal or not?

Smart phone is an individual’s property and it contains most personal and private data of a person. Every person has legal right to secure...

Don’t be a sitting duck against #IoT threats

As the Internet of Things (IoT) continues to gain traction, organizations will have to reassess their security practices to accommodate the increase in security...

Clues are Dead – Kaspersky Lab’s Threat Predictions 2017

Kaspersky Lab’s discovery in 2016 of an APT-able to create new tools for each victim has effectively killed off ‘Indicators of Compromise’ as a...
As much as 70 percent of IoT devices comprise security flaws, which means devices that you own could get hacked by online criminals too.

Guest Post: Do You Own One of the Most Hackable Devices?

An IT solutions company in the Philippines, as well as other cybersecurity firms, have stressed that everything connected to the Internet is hackable. From...

Cyber Crime: Are your online banking transactions safe?

'Checking your account balance, paying bills and managing your finances… Nowadays, it is pretty normal to do all those things online.... But are you...

Kaspersky Lab announces new business solution to empower SMBs

Kaspersky Lab announces a new Software-as-a-Service solution that will provide small and medium-sized businesses with multi-layered IT security. Known as Kaspersky Endpoint Security Cloud,...
Sophos Intercept X installs alongside existing endpoint security software from any vendor, immediately boosting endpoint protection by stopping malicious code before it executes.

Sophos unveils Sophos Intercept X to extend its Next-Generation Endpoint Security Capabilities

Sophos has announced has unveiled its next-generation endpoint security product that stops zero-day malware, unknown exploit variants and stealth attacks. Known as Sophos Intercept...

Sophos recognized as a Quadrant Leader of Gartner’s 2016

Security solutions provider Sophos has been positioned in the “Leaders” quadrant of Gartner, Inc.’s Aug. 30, 2016, "Magic Quadrant for Unified Threat Management.” This...
The R&D center will be focused on developing data analysis and machine learning technologies for the company’s enterprise solutions offering. Photo Source: Kaspersky Lab Blog

Kaspersky Lab opens its first Research and Development office in Europe

Kaspersky Lab has announced the opening of its first European research and development (R&D) center, in Dublin, Ireland. The company initial investment into the...

Guest Post: The security questions raised by IoT

In a world where devices are getting more powerful and smaller, IoT has become a common term even to the layman. Using sensors and...

Security software giant Avast is acquiring rival AVG for $1.3b

Security software company Avast  has announced that it is buying rival AVG Technologies for $1.3 billion in an all-cash deal. The transaction  has already...

Sophos meets Kenyan patners to shares its new network security features

Network and endpoint security firm Sophos today met its partners in Kenya to showcase and educate them on new security features on their portfolio...

ESET Unveils New tool to help parents monitor their children’s online activities

Global Security software provider ESET has unveiled a new tool to help parents monitor what their children are doing online. The ESET Parental Control for...

Guest Post: 6 ways you can protect your business from hackers

Your business is invaluable. You put in a lot of hard work towards the growth of your business and gaining customer trust. One day you...

1,800 cameras to be mounted on Nairobi streets to improve security

In a project aimed at improving the security situation in the country through technology,  1,800 cameras will be  mounted in the streets of Nairobi...

CONNECT WITH US

5,682FansLike
1,253FollowersFollow
3,373FollowersFollow

TRENDING

Ngao Credit: Here’s how to take advantage of our Import Financing...

Ngao Credit Import Financing: If you have plans to purchase your dream car this year, chances are that you have considered import financing.  Import financing...

24Bit Podcast Ep 24: Buying Smartphones Through Device Financing Plans

In this latest episode of our 24Bit podcast, Emmanuel Chenze, Nick Kanali and Dickson Otieno discuss different device financing plans in Kenya including Lipa...

EDITOR'S PICK

Telkom and Airtel Kenya Merger Talks Mutually Dropped

Telkom Kenya and Airtel Kenya have consensually halted their merger talks. The two announced that the mutual pullout was due to regulatory delays. Telkom...