Open/Close Menu Securing your Business Critical Applications

In the spate of recent global cyber-attacks, South Africa, like other leading countries across the world have begun putting initiatives to combat this toxic threat. Understanding the mindset of the hackers and the loopholes within your institution is very key. Most importantly, the use of proper technology to combat the threat is also very necessary…

Sometimes, we choose to categorically ignore incoming calls only to return the call later or atimes take them later should the caller dial again; In most cases , we have valid reasons for our actions, either owed to the time the call came in, nature of call or even the caller; for instance, there could be…

Post-millennium bug era (Early 2000 – 2006), Cyber-Security had just become a relatively new concept, but had come to stay. Infact, there was only a handful of experts speaking on Security issues as at then. Today, we now hear of topics like Advanced Persistent Threats (APT), a term that was first coined by the United…

© 2015 - 2017 DeltaGRiC Consulting | Your Enterprise Application Security Assurance!

logo-footer
logo-footer

STAY CONNECTED WITH US: