Reminder: 31st July 2015 Africa Hackon Conference


Africahackon is East Africa’s premier technical computer security collective which brings together the individual talents of the best and brightest security professionals in the region, through live presentations, engaging discussions and hands on demonstrations. They are connoisseurs in a full range of defensive and offensive security topics are well versed in the theoretical aspect of cyber security and masters on the practical and tactical angle of the art.

Tickets & Venue
Venue: iHub, 4th Bishop Magua Center, Nairobi.
Tickets: Available at Ticket Sasa. Advance tickets going for Ksh. 1,500

These are just a few of the items that will be discussed on that day. If you want to reap big from this new industry in Kenya then you must be there.

Cyber Security done the right way – by Gabriel Mathenge

A quick Google search will define a cyber-threat as ‘the possibility of a malicious
attempt to damage or disrupt a computer network or system’. It may sound like a
rather broad definition and that’s because it is. Cyber-threats exist in numerous forms,
and their motivations vary just as broadly. Cyber-crime, cyber-terror and cyber-war
are all valid examples of cyber-threats. Cyber-threats can stem from multiple parties;
hackers/hacktivists, criminals, national governments, terrorists, disgruntled/greedy
employees and many more.
The internet lies at the very heart of modern society and has become a crucial aspect
of nearly all our lives today. A sector report by the Communication Authority of Kenya
(CA) shows that the number of Internet users in Kenya rose to 26.1 million in the
last quarter of 2014, that’s nearly 60% of the population. Cyberspace and all the
threats it carries impact all our lives; personal and business, both in the public and the
private sector.

Cyber Security in the organization by Chrispus Kamau

Cyber Security is increasingly becoming a key component of the strategy of organizations
in the country. Gone are the days when cyber security was relegated to the IT department
as a by the way task. Today organizations are desperately looking for talented information
security managers and chief information security officers. This is a step in the right
direction but a lot is still wanting.
Foremost is the lack of skilled information security personnel to fill these roles. Most of
the candidates are general IT practitioners who acquire a security related certification
which then becomes their only qualification. Most lack the technical skills and capacity to
steer organizations through successfully cyber security programs. A side effect is top
level management being led to splash huge amounts of money on hardware and software
while neglecting proper security procedures and practices. Not many organizations have
staff awareness programs, ignoring or not been properly advised on the crucial nature of
educating and inculcating a security culture throughout their organization.

Demystifying Website Defacement in Kenya

A web defacement is where a malicious hacker will gain unauthorized access to a legitimate
website, with the aim of altering the appearance of the site by replacing hosted web pages with
their own. The motive behind defacements fall into one or more categories below: Political
motivation, hacktivism, financial gain and social gratification.

Is it a Hack or Not?

A vast majority of IT professionals do not consider defacement a hack. This is because
replacement of we bpages does not result in as much harm as taking a website offline via a
Distributed Denial of Service (DDoS) attack or persistent access to the website via multiple
well-crafted code hidden on the website directories.
Defacements are a hack like any other because for it to occur it has to go through the three
cycles of any cyber-attack i.e. reconnaissance, exploitation and exfiltration. Defacements are
proof that the website lacks proper and updated security measures in place.

A noble calling – getting into the cyber security field by George Wahome

“I recall back in 2008 when I was working at Broadband Communications, we had a bad
case of spam mails. Seeing that I was the only I.T person at the time, everyone looked
to me for answers. Just from campus and on my first job, I was totally clueless on
where to start. We had to bring an expert who was charging on the hour to come to
our rescue. The guy was called Munyao (I remember him to date with good reason,
continue reading). He connected to our firewall and router did some geeky stuff on a
black screen, all this time , the CEO any myself were standing behind him gazing in
awe. The response after he provided the solution sparked a subconscious interest in
the security field that manifested in all my interactions and engagements going
In 2009, when I just landed a job at Safaricom I was continuously trying to conjure up
my space in the technology industry. In the process I landed on this saying by Martin
Luther, “If You’ve Got Nothing Worth Dying For, You’ve Got Nothing Worth Living
For; since dying for something important is better than living just for existence”, which
resonated with my psyche.”

Quite a fascinating story click here to read the full story.