See how it works
Book Joseph with Paydesk
Make your booking securely through paydesk for these benefits:
1
Preferred Booking Channel
Joseph is more likely to commit to assignments booked through paydesk, as it is a trusted platform that validates the seriousness and legitimacy of each engagement.2
Insured Bookings for Peace of Mind
We provide basic insurance coverage with each booking on paydesk, giving both you and the media professional confidence and protection while they work for you.3
Effortless Online Payment
Paydesk offers a payment protection system to ensure payments are only finalized when you are satisfied with the job completion. Freelancers trusts our process that guarantees their efforts are rewarded upon successful delivery of servicesStill have questions?
Check FAQAbout Joseph
I am an all-round media expert professionally trained as a videographer, photographer, editor and director & drone operator with 8yrs of experience, who is keen to details and focused on delivery of unrivalled projects. I have gained competitive industry skills through high level production assignments I have been privileged to engage in and delivered results. Media is my passion, and I dedicate my creative prowess, skills and abilities to conquer and give a new meaning to an organisation or client who looks up to unique, out of the box thinking mentality. Iam based in Nairobi Kenya
English
Swahili
Portfolio
Awareness, experiences and perceptions regarding genetic testing and the return of genetic and genomics results in a hypothetical research context among patients in Uganda: a qualitative study
The study explores patients' awareness, experiences, and perceptions regarding genetic testing and the return of genetic and genomics results in Uganda. Most respondents were aware of genetic testing and supportive of genetic and genomics research (GGR), though few had undergone testing. Challenges include the high cost of genetic testing in clinical settings and the need for government intervention to make it affordable. The study highlights the importance of genetic counseling, informed consent, and community engagement. Ethical considerations, such as privacy and confidentiality, are crucial, especially given the potential social and psychological harms of genetic information disclosure.
Perspectives and experiences of researchers regarding feedback of incidental genomic research findings: A qualitative study
The study explores the perspectives and experiences of Ugandan researchers regarding the feedback of incidental genomic research findings to participants. It highlights the ethical, social, and regulatory challenges associated with returning genetic information, especially in the absence of specific guidelines. Researchers generally support sharing clinically significant incidental findings, emphasizing the role of professional judgment, ethics committees, and the need for genetic counseling. The study underscores the necessity for context-specific ethical guidelines to navigate the complexities of genomic research in Uganda and similar settings.
President Uhuru Kenyatta has been declared winner of the disputed election rerun in Kenya. Kenyatta who ran against other minor candidates after his main rival pulled out of the race won 98.2% of the votes
Kenya’s opposition leader Raila Odinga has called the Thursday repeat presidential vote a sham on the grounds that the voter turnout was very low. He says new elections must be held within 90 days. Tensions remain high in the country amid post-election.
As usual the Covid 19 vaccine solution has come from the western world and while Africa carries about 20% of the global burden of disease, its scientific output represents less than 1% to the world share according to Elsevier
Like any other communities struggling during these tough times, we are looking at pastoralists struggles in Loitoktok, Kajiado county, Kenya.
a child drying fish in Turkana county
food distribution drive in Turkana county
The Desert Locust crisis that hit the Greater Horn of Africa earlier this year is re-escalating, particularly in Kenya, Tanzania, Ethiopia & Somalia, as widespread breeding and new swarms are starting to form. This is posing a major threat to food securit
LGBTQ people are largely ostracised in Kenya and are often seen as mentally ill, immoral, or un-African. Hate crimes against LGBTQ community including mob violence, are common, and due to the continuing criminalisation can be perpetrated with impunity, as
Biometrics and Cybersecurity
Biometric security is increasingly adopted for cybersecurity, with technologies like facial recognition, fingerprint scanners, and iris scans becoming mainstream, led by companies such as Apple Inc. Despite its advantages, biometric security is not foolproof and can be compromised. Organizations must recognize their vulnerability to attacks and the implications of data breaches. Advanced biometrics, such as voice recognition by Citibank and heartbeat monitoring by Halifax, offer additional protection layers. Ford uses biometric sensors in cars to analyze driver behavior for security. Biometric security should be part of a multi-factor authentication system rather than a standalone solution due to the potential for determined hackers to bypass it.
Incident Response – A Complete Guide
Incident response is a structured approach to managing the aftermath of security breaches or cyber-attacks, aiming to limit damage and reduce recovery time. The article emphasizes the importance of having a well-documented incident response plan, which includes preparation, identification, containment, eradication, recovery, and lessons learned. It highlights the roles and responsibilities of an incident response team, the types of security incidents, and the critical elements of an incident response plan. The text also discusses the importance of proactive measures, such as training and ongoing oversight, to ensure the effectiveness of the response plan. The article concludes by stressing the need for prevention and the significance of addressing the most impactful security incidents first.
Virtualization Security – A Complete Guide
Virtualization, a concept that has evolved over fifty years, now supports complex applications and is predicted to handle 70% of computer workloads by 2024. The article discusses the security benefits of virtualization, such as data isolation, centralized storage, and improved physical security, while also highlighting challenges like file sharing risks, hypervisor vulnerabilities, and network storage threats. Traditional security approaches like firewalls and anti-virus software are deemed insufficient for virtual environments. Recommendations for securing virtualized environments include network security measures, disaster recovery planning, and proper management of virtual machines and hypervisors.
Cyber Threat Hunting – A Complete Guide
Cyber threat hunting involves proactively searching for attackers or malware within a network system. It requires skilled professionals to identify and mitigate threats that may bypass traditional security measures. The process includes defining the hunt, data collection, analysis, response, and learning from attacks. Effective threat hunting relies on understanding the environment, anticipating attackers' moves, and employing sufficient resources. The goal is to detect and eliminate threats that have evaded standard security techniques, ensuring the organization's safety from cyber threats.
×
Joseph's
confirmed information
✓
Financial institution
Verified Jan 2022
✓
Phone number
Verified Jan 2022
✓
Joined
Jan 2022