HomeBlog
Insights & Perspectives

Cybersecurity Intelligence
From the Field

Expert analysis, threat briefings, and practical guidance from ISOLS security practitioners, helping African organisations stay ahead of evolving cyber threats.

Zero Trust Security
Featured Article
Identity Security March 18, 2026

Zero Trust Is Not a Product — It's a Philosophy. Here's How to Build It in Africa.

As enterprises across East Africa accelerate digital transformation, the traditional perimeter-based security model is failing. We break down what Zero Trust really means, why it matters, and how ISOLS helps organisations implement it step by step.

Read full article →
Ransomware in Africa
Threat Intelligence March 5, 2026

Ransomware Groups Are Targeting African Banks. Is Your SOC Ready?

CTI data reveals a 340% increase in ransomware targeting financial institutions across Sub-Saharan Africa in 2025. We examine the tactics used and what an effective detection and response playbook looks like.

Kenya Data Protection Act
Data Protection February 20, 2026

Kenya's Data Protection Act 2019: What Organisations Must Do Before the Deadline

The Office of the Data Protection Commissioner is intensifying enforcement. We outline the key obligations, common compliance gaps, and a practical 90-day roadmap to achieve and demonstrate DPA compliance.

Privileged Access Management
Identity Security February 6, 2026

Why PAM Is the Most Overlooked Control in African Enterprises — And How to Fix It

Privileged accounts remain the number-one attack vector in enterprise breaches across Africa. We explore why PAM programmes fail and how CyberArk deployments are changing the game for ISOLS clients.

SECaaS for SMEs
Advisory January 22, 2026

SECaaS vs In-House SOC: Which Makes More Sense for Your Organisation?

Building a 24/7 Security Operations Centre in-house costs upwards of $2M annually. We compare the economics, capability maturity, and risk profile of in-house vs managed SECaaS models for East African organisations.

Supply Chain Attacks
Threat Intelligence January 10, 2026

Supply Chain Attacks Are Coming to Africa — Here's What the Data Shows

Nation-state actors and cybercrime groups are increasingly exploiting third-party suppliers to breach African enterprises. CTM360 threat intelligence from our SecOps practice reveals the emerging patterns and defences.

DLP Strategy
Data Protection December 18, 2025

Building a DLP Programme That Actually Works: Lessons from the Field

Many DLP deployments fail within 18 months due to poor policy design, alert fatigue, and lack of user awareness. We share practical lessons from ISOLS deployments across banks, telecoms and government agencies.

Subscribe to Our Security Newsletter →
Expert Security Guidance

Want insights tailored to
your organisation?

Our advisory team provides customised threat briefings, board presentations, and security posture assessments for leading organisations across Africa.