Open/Close Menu Securing your Business Critical Applications

It all began in June 2015: An anonymous tip off leading to the investigation of transactions worth billions of dollars from the Japanese Yakusa mafia, Russia Mafia, Sicilia Mafia, weapons and drug dealers on one side to prominent people like the prime minister of Iceland, Movie star – Jackie Chan on the other side of…

In 2014, records show that there was over 43 million data breaches reported by companies around the globe. These data breaches impacted negatively on organizations by disrupting business continuity, stealing customer data, creating legal liabilities, disclosing intellectual property to the wrong hands and also damaging reputation. No doubt, C-Level is beginning to understand that effective…

Water they say gives life and purity and as they say: it has no Enemy! …Perhaps, this may not be so true for the Department of Water Affairs of South Africa. Last week, during the valentine period, members of the World Hacker Team, one of Anonymous’ subdivisions, took it upon themselves to send a love…

DeltaGRiC Consulting; the ONLY consultancy within the SAP Africa Ecosystem focused on helping African businesses running on SAP have a secured SAP landscape just recently completed the first ever referenceable SAP cybersecurity project on the continent of Africa at the Royal Swaziland Sugar Corporation (RSSC). The aim of the project as is the objectives of…

Cyber Research estimations show that 1 in 4 people will experience a data breach by 2020. Today, data breach occurs as 1 in 15. As we plan to settle into our duties of protecting our individual or corporate data in 2016, we ought to be continuously conscious of the reality of the cyber woes out…

In exactly 3 days (November 26, 2015), join #DeltaGRiC and ERPScan at the Michelangelo Hotel, Sandton, Johannesburg to learn best practices on protecting #SAP landscapes from external/insider attacks. Join Merlin Knott (Director – Business Analytics, SAP Africa), Alexander Polyakov (CTO ERPScan), Tunde Ogunkoya (Consulting Partner, DeltaGRiC Consulting) and Taran Kambo (VP, ERPScan) as they unravel…

On 24 November 1859, Charles Darwin published a work of scientific literature, which today is considered to be the foundation of evolutionary biology titled “On the Origin of Species by Means of Natural Selection, or the Preservation of Favoured Races in the Struggle for Life”.  Just like Biological Sciences, our IT security landscape today has…

SAP Fraud Forensics; How far can Security Audit Logs help you? So…Last week, I was at the 8th Annual ACFE conference and it appeared as though Forensics came out open as a very hot topic amongst exhibitors. Quite a sizeable number of service providers performing forensics came to share their thoughts, and advice on how…

Sometimes, we choose to categorically ignore incoming calls only to return the call later or atimes take them later should the caller dial again; In most cases , we have valid reasons for our actions, either owed to the time the call came in, nature of call or even the caller; for instance, there could be…

Post-millennium bug era (Early 2000 – 2006), Cyber-Security had just become a relatively new concept, but had come to stay. Infact, there was only a handful of experts speaking on Security issues as at then. Today, we now hear of topics like Advanced Persistent Threats (APT), a term that was first coined by the United…

© 2015 - 2018 DeltaGRiC Consulting | Your Enterprise Application Security Assurance!

logo-footer
logo-footer
logo-footer

STAY CONNECTED WITH US: