by Rose Macharia | Sep 27, 2022 | Cybersecurity
Ways To Improve Data Security and Data Compliance Written By Rose Macharia On Within the modern digital landscape, data has become one of the most valuable business assets, so it comes as no surprise that data breaches are occurring cross-industry. Regulations such...
by Rose Macharia | Aug 17, 2022 | Cybersecurity
Endpoint Security Written By Rose Macharia On What is an endpoint An endpoint is a remote computing device that communicates with the network to which it’s connected. Some examples of endpoint devices are desktops, laptops, smartphones, and servers. Endpoints...
by Ken Wanjohi | Jul 25, 2022 | Cybersecurity
Cybersecurity Endpoint Detection and Response (EDR) Written By maxwell On July 25, 2022 WHAT IS EDR? EDR stands for Endpoint Detection and Response, also known as Endpoint Threat Detection and Response (EDTR). It is a cyber technology that continually monitors and...
by Jesse Muraya | Jul 25, 2022 | Cybersecurity
Cybersecurity Cyber Security for FinTech (Financial Technology) Written By maxwell On July 25, 2022 Before we explore various security tools and tips for the fintech sector, let me start by describing Fintech (Financial Technology). Financial Technology (Fintech) is...
by maxwell | Jul 25, 2022 | Cybersecurity
Cybersecurity Best practice for API Security 2022 Written By maxwell On July 25, 2022 APIs are an important part of digital business delivery because they connect mobile apps, and the Internet of Things, and provide the fabric that connects internal business...