August 18th, 2021 by Admin

This report assesses the extent to which the public participated in three recent ICT policy and law-making processes. These include
the National Information Communications and Technology (ICT) Policy, 2019, the Computer Misuse and Cybercrimes Act, 2018, and the Data
Protection Act, 2019.

While the principle of public participation is listed under Article 10 of the Constitution of Kenya, 2010 as one of the national values and principles of governance, the approach taken by state bodies in the ICT sector to facilitate public participation has been varied. Despite
progress in the past decade, such as the promotion of greater stakeholder engagement, better documentation and information sharing, hosting public county meetings, and making stakeholders’ inputs on publicly accessible platforms, challenges still remain.

The processes have been primarily initiated, dominated and executed by the state and its agents, in its capacity as the primary duty-bearer. However, while decisionmaking powers may rest with the government, there is an onus placed on the government to facilitate public participation.

 

Click to Download 

August 18th, 2021 by Admin

What is Hunting?

Most security technologies, tools, and processes are passive. They’re triggered by events or conditions that generate some prescribed response ─ not unlike how your immune system works to detect and address foreign bodies. Enterprise antivirus is a well-known class of technologies that illustrate this process particularly well. But these passive controls and workflows are rarely immediate. Adversaries may be able to dwell undetected in your environment for hours, days, weeks, months, or years. Even worse, adversaries have learned to maximize their success with minimal dwell time, which leaves you the narrowest margin of error to prevent data theft or business disruption.

Threat hunting has become one of the more important functions of mature security organizations – a rare capability that enables them to address gaps in passive security solutions. But at first, threat hunting can be a daunting endeavor. How can you detect attacks that don’t deploy malware or leave behind known indicators of compromise? How can you deduce the presence of “fileless”attacks that minimize disk-based evidence? The goal of this guide is to help security teams cultivate the skills and procedures that enable threat hunting.

The first chapter provides an overview of threat hunting concepts and shares ideas for integrating threat hunting into security operations. Subsequent chapters explore techniques for hunts based on different adversary techniques. Appendices offer reference materials to remind you of key information. When you pick up this guide you join a global community of security professionals. Together we can reshape the security landscape by sharing knowledge and best practices on how to protect the world’s data from attack.

 

Click to download

 

August 17th, 2021 by Admin

On May 12, 2021, President Biden issued an Executive Order (EO) aiming to improve the federal government’s efforts to “identify, deter, protect against, detect and respond” to cybersecurity incidents.

Released five days after the ransomware attack on Colonial Pipeline, it is intended as a comprehensive response to anongoing trend of increased threats.

The EO is intended to help the government modernize and mitigate the risk of cyber incidents. It also aims to encourage private-sector-owned domestic critical infrastructure to partner with and follow the federal government’s lead to take ambitious measures to augment and aligncybersecurity investments with the goal of minimizing future incidents.

The EO required quick action, with 30-day, 90-day and 365-day deadlines across seven key objectives.

Click to download

  •  Categories
  •  Disclaimer

    Unless otherwise indicated, Copyrights and Intellectual Property Rights of the documents, reports in this section of the website are under ownership of the original authors. Readers and Users of the information in the form of documents, reports and requested to comply with More..