PC Tech Magazine PC Tech Magazine
  • News
    • Artificial Intelligence
    • Banking
    • Entrepreneurs
    • Innovation
    • Partnerships
    • Technology
    • Telecoms
    • Startups
    • Social Media
  • Interviews
  • OP-ED
  • Editorial
  • National
  • Reviews
  • Pictorial
Facebook X Instagram Youtube
PC Tech Magazine PC Tech Magazine
PC Tech Magazine PC Tech Magazine
  • News
    • Artificial Intelligence
    • Banking
    • Entrepreneurs
    • Innovation
    • Partnerships
    • Technology
    • Telecoms
    • Startups
    • Social Media
  • Interviews
  • OP-ED
  • Editorial
  • National
  • Reviews
  • Pictorial
Follow Us
Follow Us
Facebook X Instagram Youtube
PC Tech Magazine PC Tech Magazine
Facebook X Instagram Youtube
  • Mastercard Foundation EdTech Fellowship 2026
  • Africa Tech Summit London 2026
  • Web Summit Africa 2026

cyber security.

66

45 posts
  • East Africa
  • News
  • News Archive

Report: 80 per cent of Kenyan websites vulnerable to cyber attacks

byPC Tech
July 25, 2012
  • Africa
  • News
  • Opportunities

IBM Injects $70M in Free Digital Skills Training for African Youths

byPaul Mugume
February 20, 2017
Image credit;media.licdn Image credit;media.licdn
  • East Africa
  • Events and Gatherings
  • News

AfricaHackOn Cyber Security Conference to take place in Nairobi

byPC Tech Events Team
June 15, 2016
  • Business
  • East Africa
  • News
  • News Archive
  • Technology

Financial Institutions in East Africa Remain Vulnerable to IT Threats

byEphraim Batambuze III
April 11, 2013
  • East Africa
  • News
  • Security

Kenya: Former Police Officer, American Citizens Arrested in Cyber Theft

byPaul Mugume
March 9, 2017
  • International
  • Internet
  • News
  • Privacy
  • Security
  • Technology

NSA warns of growing danger of cyber-attack by nation states

byPC Tech
October 27, 2015
Firewalls are the first lines of defense in protecting business databases from various kinds of cyber-security attacks. (IMAGE: sectigostore) Firewalls are the first lines of defense in protecting business databases from various kinds of cyber-security attacks. (IMAGE: sectigostore)
  • Columns
  • Editor's Pick
  • Featured
  • Security

Types of Firewalls For Beefing up Database Security

byPC Tech
May 24, 2021
Penetration testing | IMAGE: Awesome Content / Freepik Penetration testing | IMAGE: Awesome Content / Freepik
  • Columns
  • Editor's Pick
  • Featured
  • OP-ED
  • Security
  • Technology

OP-ED: Penetration Testing — Securing the IT Infrastructure

byPC Tech
June 19, 2023
NITA Uganda Executive Director, Dr. Hatwib Mugasa. (FILE PHOTO) NITA Uganda Executive Director, Dr. Hatwib Mugasa. (FILE PHOTO)
  • Editor's Pick
  • Featured
  • Interviews
  • National
  • News
  • News Archive
  • Privacy
  • Security

“Be Safe Online” Interview with NITA-U Executive Director, Dr. Hatwib Mugasa

byJoan Banura
September 30, 2021
  • Featured
  • Internet
  • National
  • News
  • News Archive
  • Security
  • Technology

NITA-U Cautions The Public To Be Vigilant on Cybersecurity Matters

byNathan Ernest Olupot
November 4, 2021

Top News

  • Smart Strategies for Successful Project Design and Budgeting
  • How Multi-Country Payroll Affects Financial Reporting and Compliance
  • Why Your First Hearing Appointment Matters More Than You Think
  • Understanding Medical Weight Loss: What the Conversation Around GLP-1 Medications Is Really About
  • Why is the IPTV Climb Gaining Attention in the Netherlands
    Why is the IPTV Climb Gaining Attention in the Netherlands?
  • Chemical Supply Trends in Modern Industrial Purchasing
    Chemical Supply Trends in Modern Industrial Purchasing
  • Common Mistakes to Avoid When Preparing for ITIL® 5 Foundation Certification
  • Smart Software Powers Modern Solar Installers
  • Over Rider
    Why More People in Dubai Are Choosing a Dedicated Driver Over Ride-Hailing
  • Defining the AI Native Game Why Generative Engines Are the New Standard for Godot Developers
    Defining the AI Native Game: Why Generative Engines Are the New Standard for Godot Developers

See Also

  • Cryptocurrency
    Trading Psychology and Emotional Control for Success
    by Staff Writer
    May 4, 2026
  • Why AI-Powered Custom Applications Are Replacing SaaS for Enterprise Workflows
    What Technology Skills Do Young Professionals Need to Succeed?
    by Alex johns
    May 3, 2026
  • Artificial Intelligence
    Tresor Wacht Strengthens Its Position with New Intelligence Capabilities
    by Alex johns
    May 1, 2026
  • Artificial Intelligence
    The True Cost of Slow IT Support
    by Alex johns
    May 1, 2026
  • Artificial Intelligence
    Proactive IT Solutions vs. Traditional IT Help: The True Cost of Waiting for Things to Break
    by Alex johns
    May 1, 2026
  • The next era of crypto wallets isn't simply a continuation of present answers but a soar forward in innovation and user empowerment. PHOTO: Forbes
    Cryptocurrency
    Beyond the Private Key: Selecting the Top Crypto Wallet Development Company in 2026
    by PC Tech
    April 30, 2026
  • Dr. James Onyoin (left), Board Chairperson and founding member of Vision Africa AI and Carols Parker (right), Head of AI Programs at Arxia, shake hands after signing an MoU. PHOTO: PC Tech Magazine
    Artificial Intelligence
    AI Can be a Game-changer For Institutions, but Only if it’s Adopted Intentionally
    by Nathan Ernest Olupot
    April 30, 2026
  • Why AI-Powered Custom Applications Are Replacing SaaS for Enterprise Workflows
    Artificial Intelligence
    What AI Already Knows About You (And What You Can Do About It in 2026)
    by Alex johns
    April 28, 2026
  • COURTESY PHOTO
    Cryptocurrency
    Cash vs. digital payments: How cryptocurrency purchases work
    by PC Tech Staff
    April 24, 2026
  • Artificial Intelligence
    8 Advantages of Generative AI Consulting Services for Modern Business
    by Alex johns
    April 22, 2026
PC Tech Magazine PC Tech Magazine
© 2025 PC Tech Magazine. All Rights Reserved.
  • About Us
  • Contact Us
  • Advertise
  • Write a Review
Facebook X Instagram Youtube