Kenya’s virtual asset service providers act, 2025: compliance pillars for the digital asset market

The coming into force of Kenya’s Virtual Asset Service Providers Bill, 2025 into law on 15th October 2025 marks a turning point for the country’s fast-growing digital asset market. The Act not only establishes a formal regulatory framework but also redefines how accountability, investor protection, and market stability will shape the crypto regulation sector going forward.

Land Due Diligence

LAND DUE DILIGENCE is the process of conducting thorough investigations and verifications before purchasing, leasing, or developing a piece of land. It is aimed at uncovering any legal, regulatory, or physical issues that may affect ownership, use, or transferability of the land.

Employee background checks

Background checks are a process used by employers to verify the accuracy of a candidate’s personal, professional, and financial history. This type of investigation involves examining a variety of records, such as criminal history, employment verification, education credentials, credit reports, and references.

Emerging trends in digital forensics: A constantly evolving field

With our increasing digital world, the field of digital forensics is evolving at an unprecedented pace. New issues and emerging trends are emerging on a daily basis, requiring investigators to up-skill and continue adapting on a continuous basis. These trends emphasize the need for professional development through regular training and acquiring relevant certifications in order to lead and catch up. This blog aims to discover and demystify the 6 biggest new digital forensics

What is Asset Tracing?

Asset tracing is a crucial process used to locate assets that have been hidden, misappropriated, or unlawfully acquired. This procedure is often employed in various contexts, including fraud investigations, divorce settlements, and debt collection. Understanding the basics of asset tracing and recovery can be vital for businesses and individuals dealing with financial disputes or fraud.

Access Control Best Practices – Implementing an Effective Access Control Policy

Access control refers to the security measures implemented to regulate and control who can access certain resources, systems, or physical areas within an organization. Access control is essential in information security and aims to protect sensitive data, maintain the confidentiality, integrity, and availability of resources, and prevent unauthorized access or misuse

Anti-Bribery and Anti-Corruption Assistance

Anti-Bribery and Anti-Corruption Assistance Occupational fraud typologies highlight different forms of fraud, one of which is corruption. Business corruption is categorized as the second most common type of occupational fraud, with the primary examples being bribery, conflict of interest, improper gratuities, and economic extortion. Bribery and corruption pose significant risks to organizations as they may […]

Threat detection spectrum and advanced threat hunting.

Threat detection spectrum and advanced threat hunting. A network environment can be defined as a communications system that ties multiple users together. In such an environment, there is a need to establish control measures to detect advanced threats in the network. The security mechanism measures should identify the threat’s movement in, out, and laterally within […]