
You have a penetration testing process. You have a risk management department. You have an internal audit team. Yet you...
You have a penetration testing process. You have a risk management department. You have an internal audit team. Yet you...
A padlock on a chicken coop means nothing if the fox has the keys. In a recent cybersecurity audit, we...
Most people think hackers wear hoodies and speak in code. That’s Hollywood nonsense. Real hackers don’t need to break your...
The incident On the morning of 3rd March 2024, a mid-sized logistics company based in Mombasa, Kenya went dark. All...
Due to the ever-growing threat landscape in the digital ecosystem, your business must embrace cybersecurity irrespective of the size of...
The first thing they stole was time. For nearly two years, a group of insiders siphoned money from the bank,...
According to Gartner’s report on ‘Innovation Insight for Attack Surface Management (ASM)’, which covers the growing need faced by security...
Due to the ever-growing threat landscape in the digital ecosystem, your business must embrace cybersecurity irrespective of the size of...
we specialize in bridging the gap between knowledge and application.
Contact Us
Cyber Security Conference
Experiences & Testimonials
Free Downloads
Surveys
Quizzes
© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd