
What is more dangerous, a lion you see charging at you, or a snake coiled silently under your chair? Every...

What is more dangerous, a lion you see charging at you, or a snake coiled silently under your chair? Every...

It was a Wednesday morning in June 2024 when a mid-sized bank woke up to a nightmare. The ATMs in...

On 4th September 2023, leaders at the agribusiness cooperative approved a UGX 280 million loan to a long-standing distribution partner....

“The attackers are not coming. They are already inside, and they are faster than you.” In March 2025, a mid-sized...

What is a black swan? Some events have never happened before. No model can anticipate them. These are modern-day black...

Kampala, June 2025. A senior finance officer at a regional bank receives a Zoom call from her Group CFO. The...

“It wasn’t me.” That was the first thing Joseph, the internal auditor of a mid-sized Ugandan bank, blurted out when...

On the morning of June 18th, 2025, a mid-level bank manager in Kampala received a call that left him trembling....

Cyberattacks do not begin with code. They begin with people. One click on a malicious email, one weak password, one...

USBs and betrayal: The small devices behind big data leaks They fit in your pocket. But they can sink an...
we specialize in bridging the gap between knowledge and application.


© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd