
It was a Thursday evening. The kind of evening when the city exhales, traffic thins, and executives convince themselves that...

It was a Thursday evening. The kind of evening when the city exhales, traffic thins, and executives convince themselves that...

I learned the hard way on a quiet Tuesday morning when a finance director with a steady voice and tired...

What happened is not mysterious. Data left the system, and it moved faster than management reacted. Logs existed, but no...

What happened is simple. A system recorded activity that did not belong there. Data moved out of its normal path,...

Donor trust is currency. Lose it, and the organisation bleeds quietly, long before the scandal reaches the papers. What happened...

It starts with a screenshot. A neat Instagram shopfront with clean product photos. Delivery in 24 hours. A WhatsApp number...

Money left a corporate account without malware, without a breached firewall. It moved because the system accepted it. The phone...

On a Thursday afternoon, the liquidity report was clean. By Monday morning, UGX 4.7 billion had moved out of the...

A cybersecurity case leaders rarely want to hear The breach did not come through the firewall. It came through a...

It happened quietly, and that is how most frauds begin in Uganda; not with alarms, but with silence. On a...
we specialize in bridging the gap between knowledge and application.


© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd