Johnie MusyokiSecuring Organizations From Cyber ThreatsWith the increased use of technology, organizations are at risk of cyber-attacks. Cyber threats in the form of malware, phishing, and…Mar 29, 2023Mar 29, 2023
Johnie MusyokiApplication SecurityIntroducing OWASP Top 10 Vulnerabilities Injection Vulnerabilities - Definition: Injection flaws allow attackers to send malicious data to…Jan 17, 2023Jan 17, 2023
Johnie MusyokiWhy there is increased cyber crime and fraud cases in kenyaIn recent years, Kenya has seen a sharp increase in cybercrime and fraud cases. This is a major concern for businesses, individuals, and…Jan 16, 2023Jan 16, 2023
Johnie MusyokiBypassing 2FATwo-factor authentication (2FA) is a security measure designed to protect accounts from unauthorized access. It requires two pieces of…Jan 7, 20231Jan 7, 20231
Johnie MusyokiWhat is the future like in cyber threat intelligenceThreat intelligence is a critical component of any successful cyber security strategy. As cyber threats continue to evolve, threat…Jan 5, 2023Jan 5, 2023