
A padlock on a chicken coop means nothing if the fox has the keys. In a recent cybersecurity audit, we...
A padlock on a chicken coop means nothing if the fox has the keys. In a recent cybersecurity audit, we...
Although this is a real case drawn from field experience, the names and locations have been altered to protect confidentiality....
Every entrepreneur talks about success. But no one tells you the price tags attached. Before I pivoted to strategy, risk,...
Dear Managers, Let me start with a simple, real-life scenario A mid-sized financial institution I will call “Bank X” approved...
Years ago, I sat across a jittery CEO of a large logistics company in Zambia. His eyes told the story...
Human error has been highlighted as a major contributing element to cybersecurity vulnerabilities for years. It is a long-standing concern...
Due to the ever-growing threat landscape in the digital ecosystem, your business must embrace cybersecurity irrespective of the size of...
The first thing they stole was time. For nearly two years, a group of insiders siphoned money from the bank,...
Application monitoring just like overall network monitoring is a vital IT function for corporate organizations. From employee productivity with the...
Human error has been highlighted as a major contributing element to cybersecurity vulnerabilities for years. It is a long-standing concern...
we specialize in bridging the gap between knowledge and application.
© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd