Uncategorized

22 Oct SAP GRC – Implementation Frameworks

Meeting Governance, Risk and Compliance (GRC) requirements can prove to be a very costly, time-consuming and material distraction from the core business activities of most organizations. Often high investment does not typically provide the requisite information for senior management to be entirely comfortable with the...

Read More

17 Sep PCI, and how to demonstrate due-diligence.

For many organisations cyber security is an abstract concept that ranks low on the IT department priority list behind the necessary daily tasks of keeping the business running. Whilst PCI compliance is not a legal requirement in the UK, it might as well be; without...

Read More

10 Jun SAP enabled firms are failing to be cyber-scared.

Is it surprising that so far in the UK, many firms running SAP software are not particularly, if at all concerned about the risks of a cyber-security attack? Perhaps it is, perhaps it isn’t. Many firms, for example in manufacturing may neither hold especially valuable intellectual...

Read More

21 May SAP Cyber Security Health Check

To learn more about our SAP Cyber Security Health Check service, please review the attached PDF. To see examples of SAP specific penetration test output (sanitised) which Soteria have conducted recently, please make contact at Enquiries@SoteriaCyber.com Soteria Cybersecurity Healthcheck-FB01  ...

Read More

24 Apr Fingerprint recognition for touch & pay.

With news immerging this week of a flaw in Samsung’s new fingerprint recognition software which enables hackers to steal the fingerprint data and bypass the security process, it will be interesting to see the knock-on repercussions amongst other businesses hoping to exploit this technology to...

Read More

21 Apr SAP denies building backdoors for NSA

Software giant SAP has denied reports that it is working with the US National Security Agency to support the agency's mass surveillance capabilities within its own big data technologies. Sounds like a political minefield. To alienate and antagonise business, or make them feel safer...

Read More

20 Apr Belgian media company La Soir experiences DDoS attack

http://www.ddosattacks.net/belgian-media-company-experiences-ddos-attack/ The attack occurred just days after pro-ISIS sympathizers launched a cyber attack against a French television network and Tunisian extremists took over a Belgian regional government website. It seems that the level of hacker-skills at the disposal of ISIS has taken many by surprise. SoteriaCyber.com  ...

Read More

19 Apr New Dark Web Marketplace Offers Zero-Day Exploits to Hackers‏

This type of practice makes it extremely difficult to know which vulnerabilities to mitigate against. As most of us have no knowledge of where / how to access the dark-web, we'll never know what information and system vulnerabilities are being traded. #CyberSecurity #SoteriaCyber http://thehackernews.com/2015/04/underground-exploit-market.html?m=1  ...

Read More

17 Apr Moore’s law. Explained for swimmers…

Computer chips are arguably both the most complex things ever mass produced by humans and the most disruptive to our lives. So it's remarkable that the extraordinary pace they have evolved at was in large part influenced by a three-page article published 50 years ago this...

Read More