Skip to content

Christoph Nagy

My name is Christoph Nagy. I am the founder and managing director of SecurityBridge - NCMI GmbH. We develop strategic security solutions for our customers, enabling them to perform automated analysis of security settings and to detect and prevent cyber-attacks against SAP© in real-time.

Cybersecurity insurance

Is cybersecurity insurance relevant for SAP?

Cybersecurity is a top-of-mind priority for organizations of all types. From businesses to government agencies and non-profits, leaders must consider a growing number of cyber threats, risks, and vulnerabilities. All organizations face uncertainty or risk. Typically, it is the risk manager’s job to guide the C-suite toward the most appropriate options for each identified hazard. The size and growth of the cybersecurity insurance market suggests an extraordinary demand.

SAP cyber resilience

How to achieve SAP cyber resilience

A wave is sweeping through IT organizations right now. Entrenched processes are being examined for effectiveness and efficiency and scrutinized from the economical perspective. It is common for cyber-attacks in the corporate infrastructure and, if worse, the enterprise applications to trigger this. Successful exploits prove the inefficiency of established security measures in the event of an attack. Upon closer inspection, it becomes apparent that the established processes and measures do not create resilience. So, what do you need to achieve SAP cyber resilience?

SAP Data Security

SAP Data Security 101: Importance of data security

This article is about data security and data protection, specifically for digital data collected and processed via SAP applications. SAP Data Security is important because plenty of business-critical information gets processed with the SAP ERP, CRM, and SRM applications. SAP Human Capital Management (HCM) manages employee matters from payroll to employment contracts. All this information is processed digitally and needs protection against unauthorized access, manipulation, or deletion.


SIEM, from log evaluation to SAP attack detection

To detect attacks on SAP, you need to evaluate the security logs in SAP.

While many organizations have spent the past few years protecting the perimeter, business-critical systems are now becoming the priority of security operations. In this article, we will look at what an SAP SIEM might look like and what data and processes are necessary to enable desired conclusions.

SAP security Patch day

SAP Security Patch Day – August 2022

August 9, 2022, is the time for the SAP Security Patch Day, this time in parallel to the black 2022 cyber security conference, the SAP Response team has released 7 patches this Tuesday.

SAP Security Solutions

SAP Security Solutions

The application security market is obscure and holds one or two surprises for those looking for an SAP security solution. Cybersecurity solutions for SAP help customers understand the ever-growing threat landscape and protect themselves effectively. In this article, we would like to discuss some points you should focus on when looking for a security solution for SAP.

SAP BTP Audit Lg

SAP BTP Audit Log

We took a closer look at SAP BTP and integrated the BTP audit log into our monitoring portfolio. Read today’s blog to learn more.

How to master KRITIS/IT-Sig 2.0 for SAP

The Federal Republic is attempting to make critical infrastructure resilient to cyber-attacks by proactively identifying vulnerabilities and implementing measures to protect attractive targets.

how to spot anomalies in SAP

The easy way to spot anomalies in SAP

How to reliably detect suspicious actions from within the huge mass of SAP systems and user activity? In this article, we’ll tell you what’s needed to detect anomalies in SAP’s log stack and put them into context to find cyber-attacks.