To Be Updated… Kindly check back on Thursday 16th November
Author : caydee
Embracing Diversity in Cybersecurity: Insights from Yarden Shafir
In the ever-evolving world of cybersecurity, the importance of diversity cannot be overstated. It not only brings fresh perspectives and ideas but also reflects the inclusivity that we strive for […]
Embracing Diversity and Inclusion: A Wonderful Experience at OffensiveCon
In the recently concluded OffensiveCon, SheHacks_KE had the privilege of serving as a diversity partner, a role that brought immense value to our team. But what exactly does it mean […]
Database Replication
Database Replication Set Up MariaDB Master-Slave Replication on Linux[Ubuntu 20.04] In this tutorial, I’ll show you how to set up MariaDB Master-Slave Replication on Linux (Ubuntu 20.04). A sizable community […]
STAYING SAFE ONLINE
STAYING SAFE ONLINE The internet is here to stay so we can as well embrace it and learn how to protect ourselves while surfing through it. In fact, a recent […]
Cyber Threat Intelligence: A Must-Have or Nice-To-Have?
Cyber Threat Intelligence: A Must-Have or Nice-To-Have? What it is Cyber threat intelligence has staked its claim as one of the most prominent proactive cybersecuritymeasures because it helps organizations predict […]
The Power of Support: Building Confidence and Conquering Imposter Syndrome in Cybersecurity
The Power of Support: Building Confidence and Conquering Imposter Syndrome in Cybersecurity You may have experienced Imposter syndrome as a cybersecurity professional at some point in your career. You might […]