From suspicion to evidence — mastering the investigation process
Although this is a real case drawn from field experience, the names and locations have been altered to protect confidentiality. Any similarities to actual persons…
<%= domainName %>
<% } %> <% if ( link_success && ! link_error ) { %><%= link_title %>
<% } %> <% if ( link_success && ! link_error ) { %><%= link_description %>
Although this is a real case drawn from field experience, the names and locations have been altered to protect confidentiality. Any similarities to actual persons…
Every entrepreneur talks about success. But no one tells you the price tags attached. Before I pivoted to strategy, risk, and leadership, I was a…
Dear Assurance Manager, Let me pull back the curtain on a real case. A financial institution processed over 300 mobile money withdrawals from dormant accounts…
Dear Managers, Let me start with a simple, real-life scenario A mid-sized financial institution I will call “Bank X” approved a USD 2.1 million loan…
Years ago, I sat across a jittery CEO of a large logistics company in Zambia. His eyes told the story before his lips did. “We…
Human error has been highlighted as a major contributing element to cybersecurity vulnerabilities for years. It is a long-standing concern in cybersecurity breaches, thus requiring…
Due to the ever-growing threat landscape in the digital ecosystem, your business must embrace cybersecurity irrespective of the size of the company. The statistics regarding…
The increasing number and sophisticated nature of cyber-crimes prevailing in industries worldwide. As governing bodies are stepping up to help organizations mitigate the prevailing attack…
Application monitoring just like overall network monitoring is a vital IT function for corporate organizations. From employee productivity with the various applications to infrastructure maintenance,…
Protecting company data, sensitive and high priority information, corporate networks, software, company equipment, and personnel is what makes physical security. Physical Security is affected by…
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.