About Salma Shabaan (Edit profile)

Journalist by proffesion.Have passion in film making and photography.
I can , i will!

CALL FOR PROPOSALS FOR LEGAL CONSULTANT

By |January 29th, 2018|

The ICT industry in Kenya has made several attempts to develop a law on cyber security. The ICT Ministry together with the Kenya Law Reform Commission (KLRC) have drafted Computer and Cyber Crimes (CCC), Bill 2016. The Bill was approved by Cabinet on the 6th April, 2017 and forwarded to the Attorney General for publication […]

TESPOK CYBER SECURITY REPORT 2016

By |November 24th, 2017|

This is an annual cyber security report by TESPOK-ICSIRT that gives statistics and case scenarios on cyber threats , both current and emerging , localized to the Kenyan cyberspace , for the year 2016.

The report quantifies observed cyber threat events in a graphical and practical way with trends and statistics from the view point of […]

HOW TO IDENTIFY FAKE NEWS

By |September 26th, 2017|

Have you ever read a news story and tried to establish the authenticity of the information to tell whether it is true or false? How do you distinguish real facts from alternative facts?

In the last couple of months, Kenyans have become victims of fake news where disinformation was employed to influence people to vote during […]

ICANN TO CHANGE INTERNET ADDRESSING SYSTEM

By |August 31st, 2017|

The Internet Corporation for Assigned Names and Numbers (ICANN) is planning a rollover of Root Zone Domain Name System security Extensions (DNSSEC) KSK as required in the Root Zone KSK Operator DNSSEC practice statement on 11th October 2017.Rolling the KSK key means generating a new cryptographic public and private key that will keep the Internet […]

TESPOK LAUNCHES 2015 CYBER SECURITY REPORT .

By |December 2nd, 2016|

The Technology Service Providers Association of Kenya (TESPOK) launched its annual Cyber Security report for the year 2015. The report covers major cyber threats that are local to the Kenyan cyberspace, from the point of view of the Internet Exchange Point.

During the official launch, TESPOK C.E.O Ms. Fiona Asonga did a presentation on the report […]

GRX LAUNCH.

By |September 14th, 2016|

The Technology Service Providers Association of Kenya (TESPOK) in partnership with the African Union Commission is launching Africa’s first GSM Global Roaming Exchange (GRX) on Thursday, 8th September 2016 at the EADC center. Her Excellency Dr. Elham M.A. Ibrahim African Union Commissioner for Infrastructure and Energy together with Mr. Joe Mucheru the CS Ministry of […]

CYBER ETHICS.

By |July 12th, 2016|

An old adage tells us “Character is what you do when no one is watching.” So it is with the Internet. Online, people can feel invisible and capable of doing things they normally wouldn’t do in person or in public – things that they know might be wrong. Manners, good judgment and being aware and […]

TESPOK Launches Kenya Internet Exchange Point of Presence in Mombasa: “Keeping intra-regional internet traffic within the region”

By |July 4th, 2016|

Technology Service Providers of Kenya (TESPOK), through the Infrastructure and Energy Department (Africa Union), in collaboration with the Ministry of Information, Communications & Technology of Kenya launched the Kenya Internet Exchange Point of Presence in Mombasa on 23rd June 2016.

Through the African Internet Exchange System (AXIS) project of the African Union Commission, Member States with […]

AfBCOP Workshop .

By |June 15th, 2016|

The first dedicated AfBCOP workshop was held on 29-30 March 2016 at the PanAfric Hotel in Nairobi, Kenya, bringing together leading networking experts from commercial, academic and public sectors in order to discuss best practices. The workshop was organised and sponsorship by TESPOK, the Kenyan association of Technology Service Providers, and involved Jan Žorž, the Internet Society’s Operational Engagement Programme […]

CYBER SECURITY AWARENESS.

By |March 15th, 2016|

Have you ever been a victim of a cyber attack? Most people have experienced it in one way or another If we were to make a list of some of the common attacks; social media has the most attacks , followed by ATM cards and online transactions. Most users don’t know how to stay safe […]