Nothing found here
Perhaps You will find something interesting from these lists...
All Blog Posts:
- Procedure for Designation of CII and Compliance
- Guidelines for Implementing Security Operations Centers (SOC)
- Cybersecurity Standards for Adoption
- Budapest Accession Preparations Team Preliminary Meeting
- Budapest Convention on Cybercrime
- Microsoft Security Update
- Mozilla Security Update
- Cisco Security Update
- Zimbra RCE Vulnerability
- Inside the Approved Cybercrime Regulations
- Opportunities in the Cybersecurity Industry
- Securing digital and strategic interventions
- Cloud Computing Security Training
- ICT Sector Draft 1 Report Presentation
- Implementing New Cybercrime Regulations
- NC4 Strengthens Cybersecurity Measures
- Kenya Publishes CMCA Regulations, 2024
- Submission of Draft CMCA 2018 Regulations
- NC4’s Tree Planting Initiative
- Call for Public Participation on the Draft CMCA 2018 Regulations
- Launch of digital services
- CMCA Regulations Taskforce
- ISMS Conference
- The 3rd Annual ISMS Conference
- CMCA 2018 Regulations
- Workshop on multi-agency roles
- National Cybersecurity Strategy launch
- Cybersecurity Seminar
- Cybersecurity Strategy
- Online Shopping
- Google Loon Project Suspended
- If You Connect It, Protect It
- Sim Swapping
- Penetration Testing
- Privacy and Mobile Device Apps
- Cybersecurity Framework
- Internet of Bodies
- Cybersecurity Risks and Threats
- NC4 Launch