Communications Authority of Kenya (CA)

Tel Hotlines: +254-703-042700, +254-730-172700
incidents@ke-cirt.go.ke

National KE-CIRT/CC News

Symantec Internet Security Threat Report 2016

Posted on 19th September 2016

The Symantec Internet Security Threat Report 2016 report provides a quantitative and qualitative appreciation of incidents that have taken place in cyberspace during 2015, along with expert analysis on relevant emerging trends. It opens the doors to a better understanding of the constantly evolving global cyber-threat landscape. The report is available here....

Read More »

Trend Micro Second Quarter 2016 Security Report

Posted on 21st July 2015

  As part of its agreement with TrendMicro and with a view to accelerate sharing of relevant cybersecurity material to you, ITU presents Trend Micro’s quarterly report which underlines the existing and emerging malicious cyber activities observed during the second quarter of 2016. The report is available here....

Read More »

Trend Micro 2016 Cyber Threat Prediction

Posted on 28th May 2014

A report from Trend Micro on 2015 saw incidents that involved hacked or insecure devices, ranging from baby monitors, smart TVs, and connected cars. Full report....

Read More »

Trend Micro “How To Manage Online Privacy” E-Guide

Posted on 27th May 2014

Who has never seen an online ad popping, just a few minutes after searching for the exact same item? Nowadays, criminals aren’t the only one trying to use information about users of the Internet, a lot of companies are also “mining” the web. It is then really important to be aware of the fact that […]...

Read More »

ITU’s Support in Kenya’s Cybersecurity Efforts

Posted on 1st October 2012

In line with the World Summit on the Information Society (WSIS) recommendations, the International Telecommunications Union (ITU)/International Multilateral Partnership Against Cyber Threats (IMPACT), has been offering its Member States technical support towards the establishment of their national Computer Incident Response Teams (CIRTs). This initiative is under the ITU’s Global Cybersecurity Agenda (GCA) whose objective is […]...

Read More »

Child Online Protection

Posted on 26th September 2012

The Authority as the ICT regulator is mandated to protect consumers of ICT services including children. Children are a vulnerable group and there have been many cases of children unknowingly getting into dangerous situations that sometimes have detrimental effects to them. Protecting children online is a global problem that requires concerted efforts of parents, guardians, government, organisations […]...

Read More »

2012 Bit9 Cyber Security Research Report Infographic

Posted on 26th September 2012

Read More »

Experts say cooperation needed to counter Cyber Threats

Posted on 20th September 2012

The international community should join hands to deal with growing threats to computer security, as attacks by hackers have become a worldwide concern, Chinese security experts suggested. A recently released US report highlighted an unprecedented series of cyber attacks on more than 72 organizations worldwide, including the United Nations, the International Olympic Committee, governments, corporations […]...

Read More »

Cybersecurity: past, present and future

Posted on 20th September 2012

“An insider who’s gone bad can do more damage to your network than almost any hacker can do from the outside,” says Dr Paul Nielsen, director and chief executive officer of the Software Engineering Institute (SEI). The insider threat is just one of the fundamentals of security that we hear about on Patch Monday this […]...

Read More »

Monitor Children’s Internet Activity With Remote Desktop Software

Posted on 20th September 2012

Remote desktop software, sometimes referred to as remote control or PC Remote Access Software is a software package which allows a computer -the laptop your child is using upstairs, for example – to be accessed and even controlled remotely by someone on another computer (in this case your computer downstairs). While this type of technology […]...

Read More »

Powered by ITU/IMPACT

UN ITU ITU IMPACT