Open/Close Menu Securing your Business Critical Applications

Post-millennium bug era (Early 2000 – 2006), Cyber-Security had just become a relatively new concept, but had come to stay. Infact, there was only a handful of experts speaking on Security issues as at then. Today, we now hear of topics like Advanced Persistent Threats (APT), a term that was first coined by the United…

Some 3 months ago, two members of a Vulnerability research team: Charlie Miller and Chris Valasek started a project to look into the vulnerabilities that may exist in an automobile manufacturers firmware and Software, they chose Chrysler this time. It only took them a month to realize where the loop holes were in the Chrysler…

Report: Chinese Breach of USIS Started with SAP (Mother of all Data breaches) – USIS hack USIS hacked via SAP vulnerability. Lessons learnt Johannesburg, SA – June 22, 2015 – DeltaGRiC Consulting, the leading and yet ONLY African niche consultancy helping organizations detect cybersecurity risks and compliance violations affecting SAP/PeopleSoft business platforms, hereby announces an…

  DeltaGRiC announces webinar focused on SAP Mobile Security Attack Vectors SAP Mobile Security in detail; Vulnerabilities exposed Johannesburg, SA – June 21, 2015 – DeltaGRiC Consulting, the leading and yet ONLY African niche consultancy helping organizations detect cybersecurity risks and compliance violations affecting SAP/PeopleSoft business platforms, hereby announces an upcoming webinar by ERPScan focused…

In the end, Organizations continue to make huge efforts to make sure their Enterprise Applications which host their Assets and Data remain secure from Cyber Criminals as a going concern, Reduce Cost of compliance as well as Assessment Costs from manual interventions. We are happy to share with you some care tips on how to…

…A Critical Step toward dealing with Cyber-Threats Organizations need a new approach to having a holistic security framework to guard against advanced cyber threats especially on the Application layer Today, Our current State is such that Organizations continue to spend in excess of $5 billion dollars on traditional endpoint security, and losing the battle against…

After an interesting week at work, I finally had some time over the weekend to go see a movie that I presumed within the community of Cyber Security and GRC enthusiasts would have attracted a lot of attention and/or commentary. Brilliantly written by Morgan Davis Foehl with a focus on an MIT “street smart” character…

On the matter of the Nigerian Bank that lost 6 billion Naira to fraud of recent …read story I must say that it is hard to read such news and not make any comment about this. To put this in perspective for readers that might not understand the Nigerian currency, 6 billion Naira would amount…

Just some few weeks after the SONY hack, the spike in the usage of words like Hack, Anonymous, Enterprise Threats, Vulnerabilities, Cyber-attack, and Exposures etc. increased to its highest peak over the last three years on social media as well as print media. Clearly, the shortfall of one corporation was enough reason for other companies…

Page 3 of 3 1 2 3

© 2015 - 2018 DeltaGRiC Consulting | Your Enterprise Application Security Assurance!

logo-footer
logo-footer
logo-footer

STAY CONNECTED WITH US: