Quarterly Reports
NATIONAL KE-CIRT/CC CYBERSECURITY REPORT (APR-JUN 2025) NATIONAL KE-CIRT/CC CYBERSECURITY REPORT (JAN-MAR 2025) NATIONAL KE-CIRT/CC CYBERSECURITY REPORT (OCT-DEC 2024) NATIONAL KE-CIRT/CC CYBERSECURITY REPORT (JUL-SEP 2024) NATIONAL KE-CIRT/CC CYBERSECURITY REPORT (APR-JUN 2024)…
Glossary
A AccessInstruct, communicate with, store data in, retrieve data from, or otherwise make use of any of the resources of the computer system.Access controlThe process of granting or denying specific…
FAQs
What is an electronic transaction (e-transaction)? An e-transaction refers to any exchange, messaging, contracting or other action concluded or executed, wholly or partially, through an electronic means. Who regulates electronic…
Law & Regulations
The Kenya Information and Communications Act of 1998, provides the framework for regulating the communications sector in Kenya. Enacted by Parliament in 1998, the Act was a deliberate attempt by…
Technical Documents
Handbook for Computer Security Incident Response Teams (CSIRTs) OWASP Top Ten Project Windows Security Cheat Sheet Linux Security Cheat Sheet Facebook Twitter Envelope
Best Practice Guides
The general information security guide is meant to improve Kenya’s cyber security posture especially among Small and Medium Enterprises (SMEs), government, private sector players and the general public. These guides…
Alerts & Advisories
ADVISORY ON BLUE WHALE CHALLENGE (7th January 2019) ADVISORY ON “EMOTET” MALWARE (31st December 2018) ADVISORY ON ONLINE SHOPPING FRAUD (26th September 2018) ADVISORY ON DISCLOSURE OF PERSONALLY IDENTIFIABLE INFORMATION…