News & Blog
- All Posts
- Blog
- Career Management
- Computer Security
- Cyber Defence
- Cyber Incidence Response
- Cyber Preparedness
- Cyber Security
- Data Privacy
- Endpoint Security
- Fraud Investigation and Examination
- Fraud Management
- IT Security Audit
- Marketing
- Mobile Security
- Training
- UX/UI Design
- Web Development

During one of our board-level presentations in August 2024, a financial institution’s Director asked, “You are the experts....

Data breaches are increasingly damaging businesses globally, with significant consequences for financial institutions and telecom companies. A notable...

In today’s complex environment, employees have access to corporate networks and are authenticated to corporate systems, as well...

While technology has driven the digital agenda and led to greater innovation, growth, and efficiency; it also opens...

What is a black swan? Some events have never happened before. No model can anticipate them. These are...

As East Africa rapidly embraces digital transformation, the region is increasingly becoming a target for sophisticated cybercriminal networks....

Unlike other types of crime, the majority of cybercrime incidents in Uganda and the East African Community go...

Kampala, June 2025. A senior finance officer at a regional bank receives a Zoom call from her Group...

The popular saying goes: “Culture eats strategy for breakfast.” And when it comes to risk, culture doesn’t just...

