News & Blog
- All Posts
- Blog
- Career Management
- Computer Security
- Cyber Defence
- Cyber Incidence Response
- Cyber Preparedness
- Cyber Security
- Data Privacy
- Endpoint Security
- Fraud Investigation and Examination
- Fraud Management
- IT Security Audit
- Marketing
- Mobile Security
- Training
- UX/UI Design
- Web Development

The incident began in early 2024 within the operational accounts of an international non-governmental organisation headquartered in Kampala....

A young loans officer, slightly built, always neatly dressed, was outperforming everyone. His loan book was growing at...

It started quietly on a Thursday evening. A mid-sized private hospital, known for its efficient outpatient services, reported...

How many of you have approved something in the last 30 days, not because you were fully convinced...

It started as a reconciliation gap that refused to behave. Not large enough to trigger panic, but not...

Last year, during a routine advisory assignment, I walked into a SACCO that believed it had strong cybersecurity....

It started quietly as a finance officer at a local organisation logged into the accounting system late in...

It started with a routine system upgrade on a Thursday evening in the city. By Monday morning, three...

On a Tuesday morning, a mid-sized organisation in Kampala woke up to a quiet disaster. Money had not...