Kernel Afrika’s GISEC 2025 Recap

Conversations, Claw Machines, and Cyber Shifts Packed halls. High-stakes headlines. Back-to-back sessions with the who’s who of cyber. This year’s Gulf Information Security Expo & Conference (GISEC 2025) moved fast, and so did the industry.  Across seven halls, 160 countries, and thousands of decision-makers, the Middle East and Africa’s ...
Continue reading

How Does U2F Work?

Universal 2nd Factor (U2F) is an additional gateway that one must pass to access protected files, and although passwords are still required, U2F makes it much more secure as it utilises a physical device in the authentication step. Here is an example of a U2F process: The user enters their username and password as stored by the website they are...
Continue reading