Skip to content
Latest Updates
The IT Risk Register
The URL – Uniform Resource Locator
Firewalls
Foundations of Information Security
IT Threats
The IT Risk Matrix
IT Risks Assessment
IT Security Risks
Information Security Basis
Sat. May 17th, 2025
Raymond Bett Blog
Art of Computing
Raymond Bett Blog
Art of Computing
Home
Resources
Consultancy
Kenya Site
Subscribe
Get in Touch
Subscribe
Kenya-National Cybersecurity Strategy 2022-2027
Kenya-The Computer Misuse and Cybercrime (Critical Information Infrastructure) Regulations, 2024
NIST - Risk Management Guide for IT Systems
The General Data Protection Regulation (GDPR) Regulation (EU) 2016 679
The Health Insurance Portability and Accountability Act (HIPAA) of 1996
Kenya- The Computer Misuse and Cybercrimes Act No 5 of 2018
Min of Info Comms and Digital Economy Strategic Plan 2023-2027
NIST Digital Identity Guidelines
Kenya-Data Protection Act No 24 of 2019
NIST Enrollment and Identity Proofing
NIST Authentication and Lifecycle Management
NIST Federation and Assertions
The Industrial Property Act
The Trade Marks Act
Previous Articles
Compliance
Information Security
Risk & Audit
The IT Risk Register
Network Security
Networks
The URL – Uniform Resource Locator
Information Security
Network Security
Threats
Firewalls
Data Privacy
Information Security
Foundations of Information Security
Search for: