News & Blog
- All Posts
- Blog
- Career Management
- Computer Security
- Cyber Defence
- Cyber Incidence Response
- Cyber Preparedness
- Cyber Security
- Data Privacy
- Endpoint Security
- Fraud Investigation and Examination
- Fraud Management
- IT Security Audit
- Marketing
- Mobile Security
- Training
- UX/UI Design
- Web Development

Have you ever watched a crack in the wall and thought, “It’s nothing, just cosmetic”? Weeks later, the...

What is more dangerous, a lion you see charging at you, or a snake coiled silently under your...

On 7th November 2024, a well-known humanitarian NGO in Kampala discovered that donor funds, meant for a maternal...

It was a Wednesday morning in June 2024 when a mid-sized bank woke up to a nightmare. The...

The early morning storm. On 12th September 2023, a sudden downpour turned Kampala Road into a river. While...

The Tuesday morning breach On Tuesday, 13th February 2024, at exactly 9:18 a.m., a finance officer at a...

On 4th September 2023, leaders at the agribusiness cooperative approved a UGX 280 million loan to a long-standing...

At 10:42 a.m. on Thursday, 18th January 2024, the operations manager of a large regional logistics company opened...

On a Tuesday morning in March 2024, a procurement officer at a mid-sized local manufacturing company approved what...

