Zero Trust has become one of cybersecurity latest buzzwords. It’s imperative to understand what Zero Trust is, as well as what Zero Trust isn’t.

Zero Trust is a significant departure from traditional network security which followed the “trust but verify” method. The traditional approach automatically trusted users and endpoints within…


They say the human being is the weakest link when it comes to security. You can have the best security hardware, software and policies in place to protect your organization or company from cyber attacks but it just takes one click on a phishing link that an employee has just…


I am sure everyone of you has ever heard of Bitcoin, Blockchain and the like. Have you ever taken time to understand what all these terminologies mean and of what purpose they are to the Cryptocurrency and Blockchain Technology in general? Ohm, I understand it is quite confusing at first…


2019

Here’s to a reflection of the year it has been.

I am not sure how many of us keep journals or rather a track of events in our lives. I am one of the people who could have more than three diaries in a year because every day’s happenings…


I have been reading a blog on successful women in technology, who have chosen to defy all odds and venture into the tech field despite it being a male dominated field for a long period now. I have really been motivated by a quote ; ” It won’t be useful…

Ann Rotich

Cyber Security Enthusiast| Patriotic Kenyan| Leader| Rotaracter| Hike Lover| Bikozulu’s (bikozulu.com) diehard| She/Her

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store