August, 2015


A Glimpse of What Happened at PIVOT East 2015


August 18, 2015

On 22nd July, PIVOT East, an innovative startups competition geared towards nurturing and supporting entrepreneur in East Africa went down at the Panari Hotel. The competition was hotly contested with the region’s 25 exceptional mobile startups fight it out to win market recognition and investor interest for the fifth consecutive year. Five winners were selected, one from each  category by panels of  judges drawn from among angel investors and representatives from venture capital firms.
Below is footage of  PIVOT East 2015 proceedings courtesy of Nusunusu Production LTD

Startups interested in participating in PIVOT East 2016 are encouraged to start building profiles of their startups on for initial business model refinement support and guidance. Semi Finalists of PIVOT East 2015 who did not make it to the finals are eligible to apply for the 2016 competition.

Read article


AfricaHackOn partners with the m:lab to provide Cyber Security Training

Training, Workshops

August 13, 2015

Internet connectivity has brought about a number of benefits. It enables us to socialize, shop, transact and do business. This brings about the aspect of sharing more and more information online both personal and confidential. In the advent of the digital age, access to the internet is readily available due to cheap and readily available smartphones and laptops. This has given rise to a cyber –savvy generation, one that communicates very frequently online.
Businesses on the other hand are moving their infrastructure online to facilitate convenience and increase productivity towards the delivery of services to the respective consumers. Through the internet businesses are able to coordinate and communicate across the world, from one remote location to the other. This aspect of inter-connectivity is what makes the internet infrastructure both appealing and a great enabler to businesses.
All the above mentioned benefits come at a price for the ill prepared in their endeavours. There are a number of risks that both the internet user and the organization is exposed to. For the regular internet user and the student, who heavily relies on the internet to access entertainment and socialize is exposed to malicious websites, crawling with malicious software that can readily infiltrate their device to steal user credentials for mail services, social network sites, online banking websites just to mention a few.
Organizations on the other hand have online services such as email, web applications, websites and portals, all of which are readily targeted and attacked due to the value of information they process, transmit or store. This makes organizations, more so in the financial sector a high value target. As this information can be either sold,used to commit fraud or facilitate unauthorized transactions.
m:lab East Africa in collaboration with AfricaHackOn will hold a one of a kind cyber security training program that targets corporates with a keen interest to strengthen Cyber Security defences in their organization’s infrastructure or, on the other hand, the individual with particular interest in personal security online.
Developed by AfricaHackOn, the program identifies the potential threats and seeks to cater to both the needs of the regular internet user and the corporate. This program will assist in bridging the gap in the lack of ­awareness, lack of requisite skill to protect oneself online, provide insight on how to utilize tools, write scripts/programs and utilize information to help safeguard their online presence and protect their critical online resources.
The main objectives of the program are:


  1. Provide Hand­On cyber security training to equip the participants with the relevant skills and knowledge to protect themselves online.
  2. o

  3. The participants to understand how to use respective tools to ensure their safety online from theft of personal information, malicious software, websites and e­mail.
  4. o

  5. To assist organizations understand how to safeguard and defend their online infrastructure, manage insider fraud as well as how to develop strategies against cyber­crime.
  6. o

  7. Practically demonstrate how to properly conduct cyber security and penetration testing assessments.
  8. o

  9. To provide a platform to share knowledge and experiences.

The scope of the Cyber Security Program is towards all cyber citizens with a curious mind for cyber security, individuals looking for a carrier in cyber security or cyber security professionals in the corporate environment.
This program caters for our cyber­savvy generation by providing a holistic learning experience that would enable them to be smarter, safer and cautious online protecting themselves from scams and attacks or defending corporate networks against Advanced Persistent Threats (APT)
Training course content


  1. Security Strategy Development and Implementation
  2. o

  3. Emerging Technologies in Banking
  4. o

  5. GSM and Radio Frequency Security
  6. o

  7. Penetration Testing
  8. o

  9. Vulnerability Assessments
  10. o

  11. Web ­Application security
  12. o

  13. Wi­FI Security
  14. o

  15. Social Engineering
  16. o

  17. Governance and Legislation

The training will utilize an extensive hands­-on approach where participants will get to both attack and investigate assets on our cloud infrastructure. The practical sessions will be based on real­ life scenarios which one is likely to encounter when carrying out assessments on respective assets.
Cost and Duration
The classes will be conducted at the m:lab training facility (Bishop Magua Center-Ngong Road) over a 3-month period, from the 14th of September to 11th December, 2015. The training will take place every weekday, with an option for a morning class or afternoon/evening class, each two hours long. The cost per individual is Kshs 60,000.
Interested participants may register here.
The joint AfricaHackON and m:Lab program not only provides participants with quality hand on training but is also a platform where cyber security practitioners, enthusiast and budding professionals have a platform to interact with some of the best cyber security professionals in the continent, getting to learn, grow, exchange ideas, share experiences and build the local cyber security industry.
For any queries, kindly contact us via [email protected]

Read article


Partner with Chase Bank, m:lab and iHub to build your startup!


August 7, 2015

 Chase Bank is at the epicentre of the entrepreneurial ecosystem offering various types of support to startups as well as empowering entrepreneurs to realise their dreams. For about a year now, Chase Bank has collaborated with iHub and m:lab to nurture the Kenyan innovation and entrepreneurship ecosystems. We are now looking to directly offer a unique and valuable opportunity to game-changing startups in FinTech and/or those that rely on aspects of financial inclusion. We understand that the tech environment is dynamic and that you want a partner to not only keep up but also accelerate your success.
For the next few months we endeavour to support two startups through a mutually beneficial partnership that will see Chase Bank provide the following:


  1. Free financial consultation
  2. o

  3. Potential Integration of your innovation with Chase Bank systems

In addition, the iHub and m:lab commit to providing:


  1. iHub membership and all its accrued benefits (6 months-1year)
  2. o

  3. Mentorship for three months
  4. o

  5. Advisory services in areas such as market research and legal.
  6. o

  7. Opportunities to attend training sessions at m:lab (For developer trainings, a subsidised rate will apply)

Criteria for selection


  1. Your product should be in FinTech or rely on financial services/improve financial inclusion
  2. o

  3. Have at least a working prototype
  4. o

  5. The business should be registered as a legal entity

If this opportunity appeals to your start-up business, please send a brief write-up to[email protected]by August 13th 2015. The write-up should include the following information:


  1. Business/Company Profile
    To cover:
    History/background; key personnel; etc
  2. o

  3. Solution overview
    To cover: Definition of user need/area solution covers; Description of solution; target customers; revenue models/sustainability model
  4. o

  5. Purpose for support sought
    To cover: why support is needed; what support will be used for; etc

This article was written by GLADYS KITONY.

Read article